LAB HANDOUT - Tenable - SC Specialist Course
LAB HANDOUT - Tenable - SC Specialist Course
Access control Controls who has access to an endpoint, device, file share, network share or online
service as well as the information it stores.
Authentication The process to verify that someone is who they claim to be when they try to access
a computing resource.
DMZ Segment of a network where servers accessed by less trusted users are isolated.
The name is derived from the term “demilitarized zone.”
Hacker Someone who uses a computer system to gain unauthorized access to another
system for data or who makes another system unavailable.
Intrusion detection A device or software application that monitors a network or systems for malicious
system (IDS) activity or policy violations.
Intrusion prevention Intrusion detection system that also blocks when policy violations have occurred.
system (IPS)
Malware Software intended to infiltrate and damage or disable computers. Shortened form
of “malicious software.”
Remediation The process by which organizations identify and resolve threats to their systems.
Risk The possibility that an event will occur and adversely affect the achievement of an
objective.
Security control Something that modifies or reduces one or more security risks.
Security information A solution that collects, analyzes, and correlates network, event and log data for
and event the detection of suspicious activity and compliance.
management (SIEM)
Threat actor Any individual or group of individuals that attempts to or successfully conducts
malicious activities against enterprises, whether intentionally or unintentionally.
Two-factor A method of confirming identity utilizing something known (like a password) and
authentication something possessed or a part of the individual (like entering a code sent via SMS
or a thumbprint recognition).
Virus Malware that is loaded onto a computer and then runs without the user’s
knowledge, or without knowledge of its full effects.
COPYRIGHT 2020 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG CORRELATION ENGINE ARE REGISTERED
TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE, INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR
RESPECTIVE OWNERS.
rev 010721
2. Click the M
enu button (three lines in the upper left corner) from the main dashboard.
3. Click the E
dit (pencil) icon.
5. Verify both your F irst Name and Last Name appear correctly.
6. Fill out any other required fields marked by a red asterisk (*) .
10. Click the Tenable logo in the upper left corner.
Part 1: Task 2 - Access Slides, Labs and Handouts
Step-by-step Instructions:
1. Find and click the icon that represents your current course located under the heading
Instructor-led Courses.
4. Click CONTENT.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
1
5. Observe the folder entries that represent the outline of the course. You can expand and collapse
these to access the slides, l abs and any handouts to open or download.
Part 1: Task 3 - Access Feedback Survey
Step-by-step Instructions:
1. The last item in the last folder is the link for the student Feedback Survey. If you do not see the
student feedback survey, please let your instructor know as soon as possible.
End of Exercises
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
2
rev 020921
1. Check your email as you should have received an email from u [email protected] with lab
environment information. The subject line is T
enable University - Lab Access Information.
2. Use your web browser to connect to the host labeled Tenable Core Tenable.sc on port 8000 using
HTTPS in a new incognito/private browsing window.
1. Use your web browser to connect to the host Tenable Core Nessus on port 8000 with HTTPS in a new
incognito/private browsing window.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
1
Activity Exercise Scenario: Deployment Considerations
Activity
Below is a network diagram of your organization’s network. Using the diagram, indicate where the Tenable
Products should be placed. If there are firewall rules and/or port forwarding rules, please annotate them in
the notes at the bottom.
EXERCISE
Nothing
Nothing
Nothing Nothing
DMZ
Nothing
Nothing
Sales
Nothing
Nothing Nothing
NOTES:
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
Activity Exercise Scenario: Deployment Considerations
Activity
Below is a network diagram of your organization’s network. Using the diagram, indicate where the Tenable
Products should be placed. If there are firewall rules and/or port forwarding rules, please annotate them in
the notes at the bottom.
rev 021621
1. Using your web browser, connect to the host Tenable Core + Nessus on p
ort 8000.
3. Select R
euse my password for privileged tasks.
4. Click L
ogin.
5. Click N
etworking.
6. Under I nterfaces, note the IP address of the Nessus scanner for interface e
th0. Ignore the /24 and just
note the IP address.
7. Click S
ystem.
Challenge Questions:
1. Look at the graphs on the right. How many cores does this Nessus scanner have? Is that enough?
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
1
Step-by-step Instructions:
2. Click C
heck for Updates.
4. Click U
pdate Management to review the current update policy.
Challenge Questions:
1. The default configuration is set to update automatically at boot time, and then update once per day.
Are there any reasons you might not want it to update once per day at the time listed?
1. Click N
essus.
3. Click the URL to the right of URLs. (You may have to open this in an incognito/private browsing window
to avoid certificate errors.)
4. Click A
dvanced.
5. Click P
roceed to…
7. Click C
ontinue.
9. Click C
ontinue.
11. In the Password box create a password. The password must be 14 characters with one uppercase
letter, one lowercase letter, one number and one special character.
12. Click S
ubmit.
14. Click S
canner Health.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
2
Challenge Questions:
2. Click A
dvanced. Find the line that says Login Banner. Why would you want to set a login banner on the
Nessus scanner?
End of Exercises
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
3
Answer Key
Part 1: Task 1
1. Look at the graphs on the right. How many cores does this Nessus scanner have? Is that enough?
● Two. No. This host does not have the minimum recommended cores.
2. Click the word Memory. How much memory does this host have? Is it enough?
● 8 GB. Yes.
Part 1: Task 2
1. The default configuration is set to update automatically at boot time, and then update once per day.
Are there any reasons you might not want it to update once per day at the time listed?
● There are several reasons, such as maintenance windows, or when active scans are running.
2. Does this update schedule impact the plugin updates?
● No. Plugins are managed by Tenable.sc.
Part 2: Task 1
1. Look at the scanner health, do you see any warnings?
● Yes. There is a warning for not meeting the minimum recommended number of CPUs/cores.
2. Click Advanced. Find the line that says Login Banner. Why would you want to set a login banner on the
Nessus scanner?
● Even though users won’t typically be signing into this machine, many organizations have
policies that mandate banners on every asset even if they are not being actively used. In
addition, you could also put a banner in place indicating that this Nessus scanner is being
managed by Tenable.sc, and scans and data should be accessed through Tenable.sc, not here.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
4
rev 010721
1. Using your web browser connect to the host Tenable Core + Tenable.sc on p
ort 8000.
2. Select R
euse my password for privileged tasks.
3. Click L
ogin.
4. Click N
etworking.
Challenge Questions:
3. Click the word F irewall. What is the rule for 443? Is this good practice?
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
1
Part 1: Task 2 - Generate a Diagnostic Report for Tenable.sc
Use the Management interface to generate a diagnostic report for Tenable.sc.
Step-by-step Instructions:
2. Click C
reate Report.
4. Click D
ownload Report.
1. Click T
enable.sc.
2. Click the URL to the right of URLs. NOTE: You may have to open this link in an incognito/private
browsing window to avoid certificate errors.
3. Click A
dvanced.
4. Click P
roceed to…
6. Click U
pdate License.
8. Click A
ctivate.
9. Click the +
to the right of Nessus Scanner.
11. Click R
egister.
12. After the green c heck mark appears, click Next in the top right corner.
16. In the Password box enter the password you created for Nessus in the previous lab.
17. Click N
ext.
21. Click N
ext.
24. Click N
ext.
25. We do not have LDAP server information right now, so click Skip.
32. In the Confirm Password box underneath Administrator and type Tenable123!
33. Click N
ext.
34. Deselect the toggle button Enable Usage Statistics and click N
ext.
35. Click C
onfirm.
36. Click C
omplete Setup.
Challenge Questions:
1. Look to the right of HQ Nessus underneath Scanner status. What is the status?
2. Look in the lower right corner where it says Latest Plugins. What is the ID of the first plugin?
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
3
Optional Advanced Problems
This section is optional and can be completed during any free time you may have available while taking this
course.
TOTAL ESTIMATED OPTIONAL EXERCISE TIME: 5:00 MINUTES
Task 1 - Set Banner
The company would like their name to appear on the header in Tenable.sc. Find the section in the Tenable.sc
configuration where you set the banner and set it to Tenable-Acme.
Task 2 - Set IP Randomization
The company has some Nessus scanners that will be scanning through an IPS that will block sequential
scanning. Locate the section in configuration where scanning can be set to IP Randomization and turn it on.
End of Exercises
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
4
Answer Key
Part 1: Task 1
1. What is the IP address of Tenable.sc?
● 10.0.2.246
2. Is the firewall enabled on Tenable.sc?
● Yes
3. Click the word Firewall. What is the rule for 443? Is this good practice?
● The rule for 443 is open to any IP. No, you should limit the connectivity for port 443 to only
hosts that are going to need to connect to the Tenable.sc console.
Part 1: Task 2
1. What is the format of the Diagnostic Report?
● Compressed tar
2. Does this report contain any privileged information?
● Yes, it contains detailed information about the Tenable.sc configuration.
Part 2: Task 1
1. Look to the right of HQ Nessus underneath Scanner status. What is the status?
● Updating Plugins
2. Look in the lower right corner where it says Latest Plugins. What is the ID of the first plugin?
● 10001
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
5
rev 010721
2. Log in with the credentials you created In Module 6, Part 1, Task 1, steps 6 and 7.
3. Click T
enable.sc in the menu at left.
7. Click A
ssets.
9. Click S
tatic IP List.
13. Click S
ubmit.
14. Click +
Add in the upper right corner.
15. Click S
tatic IP List.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
1
16. In the Name box, type L
os Angeles
19. Click S
ubmit.
20. Click +
Add in the upper right corner.
21. Click S
tatic IP List.
25. Click S
ubmit.
Challenge Questions:
2. Click the g
ear icon to the right of H
eadquarters and select View. How many viewable IPs does it show?
Why?
Part 1: Task 2 - Create Groups for Headquarters, Los Angeles and Chicago
Use the three asset lists to create groups with visibility limited to each asset list.
Step-by-step Instructions:
1. Click U
sers.
2. Click G
roups.
3. Click +
Add in the upper right corner.
8. Click S
ubmit.
9. Click +
Add in the upper right corner.
11. In the Search box to the right of Viewable Hosts, type Group
14. Click S
ubmit.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
2
15. Click +
Add in the upper right corner.
17. In the Search box to the right of Viewable Hosts, type Group
20. Click S
ubmit.
Challenge Questions:
1. Can a user in the Full Access Group see the scan policies created by any of the three regional groups?
2. If you wanted to create a scan policy that was available to all groups, how could you do it?
Part 2 - Custom Roles and Users
Sam Smith is on the Security team in Chicago, but doesn’t have any Tenable training. The Security Supervisor in
Chicago would like to give Sam the ability to launch scans in Chicago, but not create scan policies or upload
audit files. Sam is also not responsible for managing blackout windows.
Part 2: Task 1 - Create a Custom Role
Create a custom role that can launch scans and create alerts.
Step-by-step Instructions:
1. Click U
sers.
2. Select R
oles.
3. Click +
Add in the upper right corner.
8. Click S
ubmit.
Challenge Questions:
1. Click the g
ear icon to the right of J unior Security Analyst and select on V
iew. Look in the box labeled
Scanning Permissions. Do you see any permission here that you didn’t set? If so, what is it, and what
does it allow the user to do?
2. If you have a standalone Nessus scanner that you are using for an air-gapped network and you wanted
this role to be able to take the results from that scanner and place the data in Tenable.sc, what
permission would need to be enabled?
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
3
Part 2: Task 2 - Create a User
Create the user Sam Smith and assign him to the Chicago Group with a role of Junior Security Analyst.
Step-by-step Instructions:
1. Click U
sers and select Users.
2. Click +
Add in the upper right corner.
12. Click S
ubmit.
Challenge Questions:
1. If Sam moved to Los Angeles and started working in the Los Angeles office as a security officer, what
would we do with his account?
2. If Sam signs in right now, can he launch a scan of the Chicago office?
End of Exercises
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
4
Answer Key
Part 1: Task 1
1. Click the < on the right side to open the filter. What could you filter on to display only the asset lists
you just created? Click the > on the right side to close the filter.
● Tag = Group Asset Lists
2. Click the gear icon to the right of Headquarters and select View. How many viewable IPs does it show?
Why?
● 0. When we defined the repository in the previous lab the IP range did not include
192.168.1.0/24 so there cannot be any HQ IPs in this repository. We will fix that in the next
module.
Part1: Task 2
1. Can a user in the Full Access Group see the scan policies created by any of the three regional groups?
● No, not unless those policies are explicitly shared to the Full Access Group.
2. If you wanted to create a scan policy that was available to all groups, how could you do it?
● There are two ways that this can be achieved. You can select a given scan policy and share it
with other groups, OR you can create the scan policy using the administrator account. Scan
Policies created as the administrator are available to all organizations and all groups.
Part 2: Task 1
1. Click the gear icon to the right of Junior Security Analyst and click View. Look in the box labeled
Scanning Permissions. Do you see any permissions here that you didn’t set? If so, what is it, and what
does it allow the user to do?
● Yes, Plugin ID scans are also available. This allows users to perform remediation scans on
individual plugin IDs.
2. If you have a standalone Nessus scanner that you are using for an air-gapped network and you wanted
this role to be able to take the results from that scanner and place the data in Tenable.sc, what
permission would need to be enabled?
● You would add the permission “Upload Nessus scan results” to the role.
Part2: Task 2
1. If Sam moved to Los Angeles and started working in the Los Angeles office as a security officer, what
would we do with his account?
● From Users > Users, click ssmith to Edit User. Change Time Zone to Los Angeles. Under
Membership, change the Group to Los Angeles. Under Responsibility, change Asset to Los
Angeles.
2. If Sam signs in right now, can he launch a scan of the Chicago office?
a. No. At this point in the overall process, there are no scan policies created. However, once there
are scan policies, he won’t be able to see the data from the office he scanned.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
5
rev 010721
1. Open up a web browser to the Tenable Core + Tenable.sc on port 443 that you received in your email.
NOTE: The default link goes to port 8000 (for the management interface), you must remove the port
(:8000) to connect to Tenable.sc directly.
2. Click in the u
sername box type a
dmin
3. Click in the p
assword box type Tenable123!
4. Click R
epositories, and then select Repositories.
5. Click +
Add in the upper right corner.
7. Type T
esting in the N
ame field.
8. Type 0
.0.0.0 i n the IP Ranges field.
10. Disable G
enerate Trend Data in the Advanced Settings.
11. Click S
ubmit.
Challenge Questions:
2. When we turned off trend data, did it disable any other features?
COPYRIGHT 2020 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
1
3. Click the g
ear icon for Testing and review the options. What would you use the Export feature for?
Part 1: Task 2 - Create a Repository for Compliance Data
Create a repository for compliance data for Headquarters, Chicago and Los Angeles.
Step-by-step Instructions:
1. Click R
epositories, and then select Repositories.
2. Click +
Add.
3. Click I Pv4.
4. Type C
ompliance i n the Name f ield.
7. Change 3
0 to 365 for the D
ays Trending field in the Advanced Settings section.
8. Click S
ubmit.
Challenge Questions:
2. What are the possible reasons we changed the days trending from 30 to 365?
Part 2 - Modify Repository and Create Scan Zones
When performing the initial configuration, the repository was defined with the IPs 10.0.2.0/24 and a matching
scan zone. Modify the Vulnerabilities repository to include the IP ranges for all three offices, and create scan
zones for all three offices. Attach the one scanner to the HQ Scan Zone.
Part 2: Task 1 - Modify the Vulnerabilities Repository
Modify the Vulnerabilities repository so it includes the ranges for HQ, Chicago and Headquarters.
Step-by-step Instructions:
1. Click R
epositories, and then Repositories.
2. Click the g
ear icon for Vulnerabilities, and then select E
dit.
4. Click S
ubmit.
5. Click the g
ear icon for Vulnerabilities, and then select V
iew.
Challenge Questions:
2. The trending value on the repository is set to 30 days. Does this create any limitations?
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
2
Part 2: Task 2 - Create Scan Zones
Create scan zones for Chicago, HQ and Los Angeles. Attach the scanner to Headquarters.
Step-by-step Instructions:
1. Click R
esources, and then select Scan Zones.
2. Click +
Add.
3. Type H
eadquarters i n the Name field.
5. Select H
Q Nessus for Scanners.
6. Click S
ubmit.
7. Click +
Add.
8. Type L
os Angeles i n the Name field.
10. Click S
ubmit.
11. Click +
Add.
12. Type C
hicago in the N
ame field.
14. Click S
ubmit.
Challenge Questions:
1. If someone were to launch a scan of the Chicago network, would the scan run?
2. Do we need to give the organization Tenable-Acme access to the new scan zones?
Part 3 - Create Diagnostics Report
When contacting support about potential issues with Tenable.sc, they will typically ask for a Diagnostics Report.
Create a Diagnostics Report.
1. Click S
ystem, and then select Diagnostics.
2. Click C
reate Diagnostics File.
3. Click G
enerate File.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
3
4. Wait for the Diagnostics File to generate, and then click Download Diagnostics Report.
Challenge Questions:
1. Some problems can be identified without examining the diagnostics file. Look at the System Status
section. Are there any issues identified here?
End of Exercises
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
4
Answer Key
Part 1: Task 1
1. Why did we turn off trend data?
● By turning off trending, drive space is saved on Tenable.sc
2. When we turned off trend data, did it disable any other features?
● Yes, trending charts are no longer available.
3. Click the gear icon to the right of Testing and look at the options. What would you use the Export
feature for?
● To back up data, or move data to a new instance of Tenable.sc
Part 1: Task 2
1. Is there any way to limit a repository to just compliance results?
● No
2. What are the possible reasons we changed the days trending from 30 to 365?
● To allow for compliance trending for a year.
Part 2: Task 1
1. Look at the values for IP Ranges. Is there anything unusual?
● The entry for 1 0.0.5.0/22 has been changed to 10.0.4.0/22. This is due to the actual network
address being 10.0.4.0, the assignable IP addresses being 10.0.4.1 - 10.0.7.254, and the
broadcast address being 10.0.7.255. Tenable.sc also does not convert CIDR blocks to ranges. It
maintains CIDR notations and ranges as they were input.
2. The trending value on the repository is set to 30 days. Does this create any limitations?
● Trending analysis is limited to 30 days.
Part 2: Task 2
1. If someone were to launch a scan of the Chicago network, would the scan run?
● No, because there is no scanner in the Chicago Scan Zone.
2. Do we need to give the organization Tenable-Acme access to the new scan zones?
● Yes
Part 3: Task 1
1. Some problems can be identified without examining the diagnostics file. Look at the System Status
section. Are there any issues identified here?
● No
2. What is the purpose of stripping IPs from chapters in a diagnostics report?
● To retain organizational privacy when sharing results with Tenable.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
5
rev 021621
1. Sign into Tenable.sc with the username of s can manager and the provided password.
2. Click S
cans, a
nd then select P
olicies.
3. Click +
Add located in the upper right corner.
4. Click H
ost Discovery.
5. Type H
ost discovery scan policy in the N
ame field.
6. Click S
ubmit.
Challenge Questions:
1. Click S
cans a
nd select Policies. If you have a large number of scan policies, how can you find this
policy?
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
1
1. Click A
ssets.
2. Click +
Add.
3. Click S
tatic IP List.
4. Type C
ompanyname-hq in the N
ame f ield.
5. Type O
ffices i n the Tag field.
7. Click S
ubmit.
Challenge Questions:
1. Are there any other options for creating this asset list other than a static list that might be used?
2. Click the g
ear icon to the right of C
ompanyname-hq and select E
xport. O
pen the downloaded file in a
text editor. What version of Tenable.sc was this asset list created on?
Part 1: Task 3 - Create and Launch the First Host Discovery Scan
Create and launch a host discovery scan using the asset list you created in Task 2.
Step-by-step Instructions:
1. Click S
cans, a
nd then select A
ctive Scans.
2. Click +
Add.
3. Type C
ompanyname-hq host discovery scan i n the Name field.
4. Select H
ost discovery scan policy in the Policy f ield.
5. Click S
ettings located on the left.
6. Select a
ctive-scanning from the Import Repository d
rop-down.
7. Click T
argets located on the left.
8. Type C
ompany i n the Assets f ield.
10. Click S
ubmit.
12. Type C
ompanyname in the N
ame f ield.
13. Click A
pply.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
2
14. Close the F ilters panel.
2. Click S
cans and select Scan Results. Click the gear i con to the right of Companyname-hq host
discovery scan. What was the scan duration?
Part 1: Task 4 - Adjust Host Discovery Scan to Run Daily
Now that we have confirmed the Host Discovery scan is running properly, we will adjust the scan so it runs
automatically overnight starting at midnight US Central Time each day.
Step-by-step Instructions:
1. Click S
cans, a
nd then select A
ctive Scans.
2. Click the g
ear icon for Company-hq host discovery scan, and then select E
dit.
3. Click O
n Demand under the Schedule s ection.
4. Select O
n Demand from the F requency d
rop-down.
5. Click D
aily.
6. Click the T
ime drop-down.
7. Click 0
0:00.
8. Click the T
imezone drop-down.
9. Type A
merica/Chicago in the text field, and then hit Enter.
10. Click A
merica/Chicago.
11. Click S
ubmit.
Challenge Questions:
1. If you wanted to chain multiple discovery scans together, what would you use?
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
3
Step-by-step Instructions:
1. Sign into Tenable.sc with the username of s can manager and the provided password.
2. Click S
cans, a
nd then select P
olicies.
3. Click +
Add.
4. Click H
ost Discovery.
5. Type O
perating System Discovery Policy in the Name f ield.
6. Click the H
ost Enumeration drop-down under the Configuration section.
7. Select O
S Identification.
8. Click S
ubmit.
Challenge Questions:
2. Is there a way to change the ping options using the OS ID discovery method in the policy?
1. Click S
cans, a
nd then select A
ctive Scans.
2. Click the g
ear icon for Companyname-hq host discovery scan.
3. Select C
opy.
4. Click the g
ear icon for Copy of Companyname-hq host discovery scan.
5. Select E
dit.
6. Click P
olicy drop-down, and then select Operating System Discovery Policy.
7. Rename the scan Companyname-hq operating system discovery scan i n the Name field.
8. Click S
ubmit.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
4
Part 2: Task 3 - Adjust Operating System Discovery Scan to Weekly
Now that we have confirmed the host discovery scan is running properly, we will adjust the scan so it runs
automatically overnight starting at midnight US Central Time each day.
Step-by-step Instructions:
1. Click S
cans, a
nd then select A
ctive Scans.
2. Click the g
ear icon for Company-hq Operating System discovery scan and select E
dit.
3. Click E
very day at... located in the S
chedule section.
4. Select W
eekly from the F requency d
rop-down.
6. Click S
ubmit.
Part 3 - Scan for Common Number Ports
We want to scan for common ports to make sure we have proper firewall rules in place.
Part 3: Task 1 - Create an Port Scanning Discovery Policy
Sign into Tenable.sc and create a port scanning discovery policy.
Step-by-step Instructions:
1. Sign into Tenable.sc with the username of s can manager and the provided password.
2. Click S
cans, a
nd then select P
olicies.
3. Click +
Add.
4. Click H
ost Discovery.
5. Type C
ommon Port Discovery Policy i n the Name field.
6. Click the H
ost Enumeration drop-down in the Configuration section and select Port Scan (common
ports).
7. Click S
ubmit.
Challenge Questions:
1. Will this scan policy scan the Nessus scanner if it is in the scan range?
2. If the scan uses ICMP ping, how many retries will it use?
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
5
1. Click S
cans, and then select Active Scans.
2. Click the g
ear icon for Companyname-hq host discovery scan.
3. Select C
opy.
4. Click the g
ear icon for Copy of Companyname-hq host discovery scan.
5. Select E
dit.
6. Select C
ommon Port Discovery Scan from the P
olicy d
rop-down.
7. Rename the scan Companyname-hq Common Port Discovery Scan in the Name field.
8. Click S
ubmit.
3. Credentials were not provided, so how was the scan able to perform a netstat scan?
End of Exercises
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
6
Answer Key
Part 1: Task 1
1. Click Scans, and then select Policies. If you have a large number of scan policies, how can you find this
policy?
● Use the filter on the right side of the policies window.
2. Click the gear icon to the right of Host discovery scan policy and select Export. Open the downloaded
file with a plain text editor. Scroll down to Plugin Preferences on line 199. Look at the line underneath
<PluginName>Ping the Remote Host</PluginName>. What plugin ID reports on pings?
● 10180
Part 1: Task 2
1. Are there any other options for creating this asset list other than static that might be used?
● Yes, you could use a Dynamic Asset list with a field of Address is 10.0.2.0/24
2. Click the gear icon to the right of Companyname-hq and select Export. Open the downloaded file in a
text editor. What version of Tenable.sc was this asset list created on?
● 5.15.0
Part 1: Task 3
1. How many hosts were discovered in the scan?
● 7
2. Clinic on Scans and Scan Results. Click the gear icon to the right of Companyname-hq host discovery
scan. What was the scan duration?
● Scan times will vary, but should be less than 3 minutes.
Part 1: Task 4
1. If you wanted to chain multiple discovery scans together, what would you use?
● Dependent scans
2. What Plugin ID contains Nessus Scan information?
● Plugin ID 19506
Part 2: Task 1
1. What pings will be used in this policy?
● TCP, ARP and ICMP
2. Is there a way to change the ping options using the OS ID Discovery method in the policy?
● No
Part 2: Task 2
1. What operating systems were discovered during the scan?
● Linux Kernel 2.6, Amazon Linux AMI, Ubuntu 16.04 Microsoft Windows 10
2. How Many Windows 10 hosts were discovered?
● 1
Part 2: Task
No challenge questions
Part 3: Task 1
1. Will this scan policy scan the Nessus scanner if it is in the scan range?
● Yes
2. If the scan uses ICMP ping, how many retries will it use?
● 2
Part 3: Task 2
1. Did you discover any web servers running on port 80?
● Yes
2. What method of port scan was performed?
● Syn and Netstat port scanning
3. Credentials were not provided, so how was the scan able to perform a netstat scan?
● The Nessus scanner used Netstat as a local command on itself.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
7
rev 012921
1. Sign into Tenable.sc with the username of s can manager and the provided password in your email.
2. Click S
cans, a
nd then select P
olicies.
3. Click +
Add located in the upper right corner.
4. Click B
asic Network Scan.
5. Type B
asic Network Scan Policy i n the Name field.
6. Click S
ubmit.
Challenge Questions:
1. Open the scan policy and look at the settings. What is the max simultaneous checks per host value?
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
1
Part 1: Task 2 - Create and Launch a Non-Credentialed Scan
Using the Asset list created in the previous lab, create and launch a non-credentialed scan.
Step-by-step Instructions:
1. Click S
cans, a
nd then select A
ctive Scans.
2. Click +
Add.
3. Type C
ompanyname-hq Non Credentialed Scan i n the Name field.
4. Select B
asic Network Scan Policy from the Policy drop-down.
5. Click S
ettings located on the left.
6. Select a
ctive-scanning from the Import Repository drop-down.
7. Click T
argets located on the left.
8. Type C
ompany i n the Assets Search field.
10. Click S
ubmit.
12. Type C
ompanyname in the N
ame f ield.
13. Click A
pply.
16. Click S
can Results.
1. Are you able to use the List Software analysis tool with the results of this scan?
2. Were there any hosts in these scan results that did receive a credentialed scan and if so, why?
Part 2 - Credentialed Vulnerability Scan
Best practices call for credentialed scans wherever possible. Create credentials for Windows and Linux hosts
and launch a scan of the asset list companyname-hq.
Part 2: Task 1 - Create Windows and Linux Credentials
Best practices for Vulnerability Assessment call for credentialed scanning with administrative level
credentials whenever possible. Create a set of Windows and Linux credentials.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
2
Step-by-step Instructions:
1. Click S
cans, and then select Credentials.
2. Click +
Add.
3. Click P
assword from the W
indows section.
4. Type W
indows Credentials i n the Name f ield.
6. Type T
enable123! i n the Password f ield.
7. Click S
ubmit.
8. Click +
Add.
9. Click P
assword from the S
SH s ection.
10. Type L
inux Credentials i n the Name field.
12. Type T
enable123! i n the Password f ield.
15. Click S
ubmit.
Challenge Questions:
1. What Tenable.sc users have access to these credentials for scanning purposes?
2. What other options are there available for privilege elevation with Linux credentials?
Part 2: Task 2 - Create and Launch a Credentialed Scan
The Basic Network Scan policy used in the non-credentialed scan can also be used for a credentialed scan.
Copy the non-credentialed scan, rename it and add Windows and Linux credentials.
Step-by-step Instructions:
1. Click S
cans, and then select Active Scans.
2. Click the g
ear icon for Company-hq Non-Credentialed scan a
nd select Copy.
3. Click the g
ear icon for Copy of Companyname-hq Non-Credentialed scan a
nd select Edit.
5. Click C
redentials, a
nd then +Add Credential.
6. Click the N
othing Selected drop-down, and then select Windows.
7. Click the N
o Items Selected drop-down, and then select Windows Credentials.
9. Click +
Add Credential.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
3
10. Click the N
othing Selected drop-down, and then select SSH.
13. Click S
ubmit.
15. Click S
can Results and wait for the scan to finish.
Challenge Questions:
1. Click S
cans, and then select Policies.
2. Click +
Add.
3. Click B
asic Network Scan.
4. Type F ast B
asic Network Scan Policy in the Name field.
6. Click the A
dvanced drop-down in the Configuration section and select C
ustom.
7. Click A
dvanced on the left.
9. Enter the value 10 i n the Max Simultaneous Checks Per Host f ield.
10. Enter the value 252 i n the Max Simultaneous hosts f ield.
11. Click S
ubmit.
Challenge Questions:
1. Click S
cans, and then select Active Scans.
2. Click the g
ear icon for Companyname-hq Credentialed Scan and s elect Copy.
3. Click the g
ear icon for Copy of C
ompanyname-hq Credentialed Scan and select Edit.
4. Rename the scan Fast Credentialed Vulnerability Scan of HQ in the Name field.
5. Select F ast Basic Network Scan Policy from the Policy drop-down.
6. Click S
ubmit.
8. Click S
cans, and then select Scan Results.
2. Look at Plugin ID 19506 for a single host on this scan, and look at the plugin output: Do you see your
changes to the policy in the plugin output for this plugin?
Part 4 - Disabling Safe Checks
There are some vulnerabilities where the only way to test for the vulnerability is to compromise the host. The
default Basic Network Scan policy will not perform these tests. In this section, we will create a scan policy with
safe checks disabled.
Part 4: Task 1 - Create a Basic Network Scan Policy with Safe Checks Disabled
Create a scan policy named “Unsafe Basic Network Scan Policy” using the Basic Network Scan Policy
template and disable safe checks.
Step-by-step Instructions:
1. Click S
cans and select Policies.
2. Click +
Add.
3. Click B
asic Network Scan.
4. Type U
nsafe B
asic Network Scan Policy in the N
ame field.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
5
5. Type Vulnerability Scan policies i n the Tag f ield.
6. Click the A
dvanced drop-down under the C
onfiguration section.
7. Select C
ustom.
8. Click A
dvanced on the left.
9. Locate E
nable Safe Checks and disable this option by clicking the toggle to move it to the left.
10. Click S
ubmit.
Challenge Questions:
1. Click S
cans, and then select Active Scans.
2. Click the g
ear icon for Companyname-hq Credentialed Scan.
3. Select C
opy.
4. Click the g
ear icon for Copy of C
ompanyname-hq Credentialed Scan.
5. Select E
dit.
6. Rename the scan Unsafe Credentialed Vulnerability Scan of HQ i n the Name field.
7. Select U
nsafe Basic Network Scan Policy from the P
olicy drop-down.
8. Click S
ubmit.
10. Click S
cans, and then select Scan Results.
2. Filter on Low, Medium, High and Critical vulnerabilities, and see how many vulnerabilities you found.
Now compare that with the previous credentialed scan. Did you find more vulnerabilities?
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
6
Part 5 - Malware Assessment
Tenable.sc can perform malware assessment on hosts using credentialed scans. In this section, we will create
a scan policy that just performs a malware assessment on targets.
Part 5: Task 1 - Create a Malware Scan Policy
alware Scan policy using the Malware Scan policy template.
Create a scan policy named M
Step-by-step Instructions:
1. Click S
cans, and then select Policies.
2. Click +
Add.
3. Click M
alware Scan.
4. Type M
alware Scan policy i n the N
ame field.
5. Click S
ubmit.
Challenge Question:
1. Open the scan policy and look at the options. If you wanted to check for connection to potentially
dangerous IPs, what could you do?
2. By default, does this scan perform a scan of the file system for malware?
Part 5: Task 2 - Create and Launch a Scan Using the New Scan Policy
Rather than creating a scan from the ground up, we can copy an existing scan and then modify its policy.
This prevents potential mistakes when creating the scan.
Step-by-step Instructions:
1. Click S
cans, and then select Active Scans.
2. Click the g
ear icon for Companyname-hq Credentialed Scan.
3. Select C
opy.
4. Click the g
ear icon for Copy of C
ompanyname-hq Credentialed Scan.
5. Select E
dit.
7. Select M
alware Scan policy from the Policy drop-down.
8. Click S
ubmit.
10. Click S
cans, and then select Scan Results.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
7
2. Was any malware identified?
3. How could you find out additional details about a potential malware?
End of Exercises
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
8
Answer Key
Part 1: Task 1
1. Open the scan policy and look at the settings. What is the max simultaneous checks per host value?
● 4
2. Is CGI scanning enabled in this scan policy by default?
● No
Part 1: Task 2
1. Are you able to use the List Software analysis tool with the results of this scan?
● No
2. Were there any hosts in these scan results that did receive a credentialed scan and if so, why?
● Yes, the Nessus scanner was scanned locally and so it did a credentialed scan of the Nessus
scanner.
Part 2: Task 1
1. What Tenable.sc users have access to these credentials for scanning purposes?
● Anyone in the Full Access Group
2. What other options are there available for privilege elevation with Linux credentials?
● su, su+sudo, k5login, Cisco Enable, dzdo, pbrun
Part 2: Task 2
1. How can we confirm that this is a credentialed scan?
● There are several different ways we can confirm credentials worked for scanning. Plugin ID
19506 in its scan output will tell you whether or not the scan used credentials. Plugin ID 110095
will also tell you whether credentials were successful.
2. Were there any hosts where the credentials failed?
● Yes
Part 3: Task 1
1. What concerns are there with this scan policy?
● It will put a significant load on targets, and generate a high amount of network traffic.
2. Can this policy be used for credentialed and non-credentialed scans?
● Yes
Part 3: Task 2
1. Did the scan run faster?
● Yes
2. Look at Plugin ID 19506 for a single host on this scan, and look at the plugin output: Do you see your
changes to the policy in the plugin output for this plugin?
● Yes
Part 4: Task 1
1. What concerns are there with this scan policy?
● There is some risk that scans with this policy will interfere with targets.
2. Can this policy be used for credentialed and non-credentialed scans?
● Yes
Part 4: Task 2
1. Did the scan run slower?
● Yes
2. Filter on Low, Medium, High and Critical vulnerabilities, and see how many vulnerabilities you found.
Now compare that with the previous credentialed scan. Did you find more vulnerabilities?
● No
3. In what situations might you want to use this policy?
● For hosts that are going to be on a public IP, a periodic scan using this policy against a mirror
copy of this host in a lab should be run to identify those potential vulnerabilities that might be
used against your public IP assets.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
9
Part 5: Task 1
1. Open the scan policy and look at the options. If you wanted to check for connection to potentially
dangerous IPs, what could you do?
● Add those IPs to the Custom Netstat IP Threat List.
2. By default, does this scan perform a scan of the file system for malware?
● No
Part 5: Task 2
1. Did the scan run faster?
● Yes
2. Was any malware identified?
● Yes
3. How could you find out additional details about a potential malware?
● Use the Vulnerability Detail List analysis tool and look at the plugin output.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
10
rev 021621
1. Click S
cans, and then select Audit Files.
2. Click +
Add.
3. Type “ CIS Microsoft Windows Server 2016” in the Search Templates field.
4. Press Enter.
5. Click C
IS Microsoft Windows Server 2016 MS L2.
6. Type C
IS Microsoft Windows Server 2016 MS L2 i n the Name field.
7. Click S
ubmit.
Challenge Question:
1. How would you download this audit file to view its contents?
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
1
Part 1: Task 2 - Create a CIS Compliance Scan Policy
Create a scan policy using the Policy Compliance Auditing template and attach the CIS Microsoft Windows
udit file to the policy.
Server 2016 MS L2 v1.1.0 a
Step-by-step Instructions:
1. Click S
cans, and then select Policies.
2. Click +
Add.
3. Click P
olicy Compliance Auditing.
4. Type C
IS Microsoft Windows Server 2016 MS L2 v1.1.0 Scan Policy i n the Name field.
5. Click C
ompliance.
6. Click A
dd Audit File.
7. Click S
elect a Type.
8. Click W
indows.
9. Click S
elect an Audit File.
10. Click C
IS Microsoft Windows Server 2016 MS L2 v1.1.0.
12. Click S
ubmit.
Challenge Question:
1. When creating the scan policy, there was a section labeled “Authentication.” Why did we not add
Windows credentials in that section?
Part 1: Task 3 - Create and Launch Compliance Scan and Confirm Scan Ran Properly
Copy the scan Companyname-hq Credentialed Scan and replace the scan policy with the scan policy CIS
Microsoft Windows Server 2016 MS L2 v1.1.0 Scan Policy and name it C
IS Microsoft Windows Server 2016 MS
L2 v1.1.0 compliance scan.
Step-by-step Instructions:
1. Click S
cans.
2. Click A
ctive scans.
3. Click the g
ear icon f or Companyname-hq Credentialed Scan.
4. Select C
opy.
5. Click the g
ear icon for Copy of Companyname-hq Credentialed Scan.
6. Select E
dit.
7. Rename the scan CIS Microsoft Windows Server 2016 MS L2 v1.1.0 compliance scan in the Name field.
8. Select C
IS Microsoft Windows Server 2016 MS L2 v1.1.0 scan policy from the P
olicy drop-down.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
2
9. Click S
ettings.
10. Select a
ctive-scanning-compliance from the I mport R
epository drop-down.
11. Click S
ubmit.
12. Launch the CIS Microsoft Windows Server 2016 MS L2 v1.1.0 compliance scan.
13. Click S
cans, and then select Scan Results.
16. Select B
rowse.
Challenge Questions:
2. Click Vulnerability Summary and select Severity Summary. Are there any advisories?
1. Click S
can, and then select S
can Results.
2. Click the g
ear icon for Companyname-hq Credentialed Scan.
3. Select B
rowse.
4. Open the Filters panel (>>) located on the left side of the screen.
5. Click C
lear Filters, if available.
7. Click the V
ulnerability Summary drop-down, a
nd then select List OS.
Challenge Questions:
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
3
Part 2: Task 2 - Create an Audit File, Scan Policy and Scan for the Linux Host
Perform a CIS compliance scan of the Ubuntu host. Deploy a CIS Ubuntu Linux 16.04 LTS server L2 v 1.1.0
audit file, create a scan policy and scan the Ubuntu host.
Step-by-step Instructions:
1. Click S
cans, and then select Audit Files.
2. Click +
Add.
4. Press Enter.
5. Click U
buntu Linux 16.04 LTS Server L2 v1.1.0.
6. Type C
IS Ubuntu Linux 16.04 LTS Server L2 V1.1.0 i n the Name f ield.
7. Click S
ubmit.
8. Click P
olicies.
9. Click +
Add.
10. Click P
olicy Compliance Auditing.
11. Type C
IS Ubuntu Linux 16.04 LTS Server L2 V1.1.0 i n the Name f ield.
12. Click C
ompliance.
13. Click A
dd Audit File.
14. Click S
elect a Type drop-down, and then select U
nix.
15. Click S
elect an A
udit File d
rop-down, and then CIS Ubuntu Linux 16.04 LTS Server L2 V1.1.0.
17. Click S
ubmit.
18. Click A
ctive Scans.
20. Click C
opy.
22. Click E
dit.
23. Rename the scan CIS Ubuntu Linux 16.04 LTS Server Level 2 v 1.1.0 compliance scan in the Name field.
24. Select C
IS Ubuntu Linux 16.04 LTS Server L2 V1.1.0 from the P
olicy drop-down.
25. Click T
argets.
27. Enter the IP address of the Ubuntu host (10.0.2.248) in the IP/DNS Name field.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
4
28. Click S
ettings.
29. Select a
ctive-scanning-compliance from the I mport R
epository d
rop-down.
30. Click S
ubmit.
31. Launch the CIS Ubuntu Linux 16.04 LTS Server Level 2 v 1.1.0 compliance scan.
32. Click S
can Results.
35. Select B
rowse.
Challenge Questions:
2. Click Vulnerability Summary and select Severity Summary. Were there any compliance failures?
Part 3 - Search for Credit Card Numbers on Windows Hosts
In this section we are going to search Windows hosts for credit card numbers.
Part 3: Task 1 - Create Credit Card Search Audit File and Scan Policy, then Launch Scan
Use the Credit Card Search Audit File template under Windows File Contents to create an audit file and scan
policy and scan HQ.
Step-by-step Instructions:
1. Click S
cans, and then select Audit Files.
2. Click +
Add.
3. Click W
indows Files Contents.
4. Type C
redit Card in the S
earch Templates field.
5. Press Enter.
6. Click T
NS File Analysis - Credit Card Number.
7. Type W
indows Credit Card Number Search i n the Name field.
8. Click S
ubmit.
9. Click P
olicies.
10. Click +
Add.
11. Click P
olicy Compliance Auditing.
12. Type C
redit Card Search Policy for Windows in the Name field.
13. Click C
ompliance.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
5
14. Click +
Add Audit File.
15. Click S
elect a Type and select Windows File Contents.
16. Click S
elect an Audit File, and then select Windows Credit Card Number Search.
18. Click S
ubmit.
19. Click A
ctive Scans.
21. Click C
opy.
23. Click E
dit.
24. Rename the scan Windows Credit Card Search Scan in the N
ame field.
25. Select C
redit Card Search Policy for Windows from the P
olicy drop-down.
26. Click S
ubmit.
28. Click S
can Results. N
OTE: This scan will take awhile to run, so come back later in the day and answer
these questions.
Challenge Questions:
2. Start at the first line of the file, insert the following text, taking care to note that spacing and
capitalization are incredibly important in this file:
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
6
<check_type:"Windows" version:"2">
<group_policy:"My Password Policy">
<custom_item>
type : PASSWORD_POLICY
description : "My Password Policy"
info : "Information Example"
solution : "Solution Example"
see_also : "See Also Example"
value_type : POLICY_DWORD
value_data : [15..MAX]
password_policy : ENFORCE_PASSWORD_HISTORY
</custom_item>
</group_policy>
</check_type>
3. Save the file as a plain text file with the name windowspassword.audit
4. Click S
cans, and select then Audit Files.
5. Click +
Add.
6. Click A
dvanced in the Custom section.
7. Type W
indows Password Audit in the N
ame field.
9. Click S
ubmit.
10. Click P
olicies.
11. Click +
Add.
12. Click P
olicy Compliance Auditing.
13. Type W
indows Password Check i n the Name f ield.
14. Click C
ompliance.
15. Click +
Add Audit File.
16. Click S
elect a Type drop-down, a
nd then select Windows.
17. Click S
elect an Audit File d
rop-down, and then select Windows Password Audit.
19. Click S
ubmit.
20. Click A
ctive Scans.
22. Click C
opy.
24. Click E
dit.
25. Rename the scan Windows Password Check for HQ i n the Name field.
26. Select W
indows Password Check from the P
olicy d
rop-down.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
7
27. Click S
ubmit.
29. Click S
can Results
1. Were there any hosts that were out of compliance with the minimum password length requirement?
End of Exercises
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
8
Answer Key
Part 4: Task 1
1. Were there any hosts that were out of compliance with the minimum password length requirement?
● Yes
2. How long did the scan take to run? Why?
● This scan will take at least an hour to run, because it has to do a file system search examining
contents of individual files on Windows hosts.
3. Would this be a good scan to run during business hours?
● Probably not, because it puts significant load on the IO of the disks on the hosts that are being
scanned
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
9
Advanced Problems: T ask 1
The following is an example audit file to perform the task described:
<check_type:"Windows" version:"2">
<group_policy:"My Password Policy">
<custom_item>
type : PASSWORD_POLICY
description : "My Password Policy"
info : "Information Example"
solution : "Solution Example"
see_also : "See Also Example"
value_type : POLICY_DWORD
value_data : [15..MAX]
password_policy : ENFORCE_PASSWORD_HISTORY
</custom_item>
</group_policy>
</check_type>
Advanced Problems: T ask 1
The following is an example audit file to complete the task described:
<check_type:"Windows" version:"2">
<group_policy:"Windows Version check">
<if>
<condition type:"AND">
<custom_item>
type : REGISTRY_SETTING
description : "Windows Server 2016 is installed"
value_type : POLICY_TEXT
value_data : "^[a-zA-Z0-9\(\)\s]*2016[\s]*[a-zA-Z0-9\(\)\s]*$"
reg_key : "HKLM\Software\Microsoft\Windows Nt\Currentversion"
reg_item : "ProductName"
check_type : CHECK_REGEX
</custom_item>
</condition>
<then>
<report type:"PASSED">
description : "Windows 2016 installed"
</report>
</then>
<else>
<report type:"FAILED">
description : "Windows 2016 not installed"
</report>
</else>
</if>
</group_policy>
</check_type>
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
10
rev 012921
1. Click A
ssets.
2. Click +
Add located in the upper right corner.
3. Type W
eb Servers in the S
earch Templates field.
4. Press Enter.
5. Click W
eb Servers.
6. Click A
dd ( bottom of screen).
7. Click <
to open the Filters panel located in the upper right corner.
8. Click A
ll underneath N
ame.
9. Type W
eb in the Enter Name field.
10. Click A
pply.
11. Close the F ilters panel. NOTE: I f the word c alculating appears in the asset list Web Server detection,
wait for it to finish.
13. Click V
iew.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
1
Challenge Questions:
1. Click the triangle to the right of active-scanning. How many web servers were detected?
2. Does this number appear reasonable, given the number of hosts identified in your vulnerability scans
from Lab 10?
Part 1: Task 2 - Create a Combination Asset List
After having performed a significant number of scans, the Security team wants a list of web servers in
headquarters. Create a combination asset list using the Web Server Detection and Companyname-hq asset
lists.
Step-by-step Instructions:
1. Click A
ssets.
2. Click +
Add.
3. Click C
ombination in the C
ustom section.
4. Type W
eb servers at HQ in the Name f ield.
8. Select C
ompanyname-hq.
9. Click S
ubmit.
11. Select V
iew.
Challenge Questions:
2. Click the triangle to the right of active-scanning. What IP addresses at HQ have web servers?
Part 1: Task 3 - Create a Custom Dynamic Asset List
We want to identify SMTP servers in Headquarters. Create a custom dynamic asset list for hosts accepting
port 25 or port 587.
Step-by-step Instructions:
1. Click A
ssets.
2. Click +
Add.
3. Click D
ynamic in the Custom s ection.
4. Type S
MTP Servers in the N
ame field.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
2
5. Mouse over “Any of the following are true:” in the Asset Definition section.
6. Click A
dd Rule.
7. Click the P
lugin ID drop-down, and then select P
ort.
8. Type 2
5,587 in the i s equal to field.
10. Click S
ubmit.
12. Click W
eb u
nderneath N
ame.
13. Type S
MTP in the E
nter Name field.
14. Click A
pply.
17. Select V
iew.
Challenge Questions:
2. How would you create an asset list just listing the SMTP servers in the HQ range?
Part 2 - Asset Patching
In this section, you will create an asset list of Window 10 hosts.
Part 2: Task 1 - Asset List of Windows Hosts
Create a dynamic asset list of Windows 10 hosts using a template.
Step-by-step instructions:
1. Click A
ssets.
2. Click +
Add.
3. Type “ Microsoft Windows 10” in the Search Templates f ield (Include the quotation marks.).
4. Press Enter.
5. Click M
icrosoft Windows 10.
6. Click A
dd.
7. Click <
to open the Filters panel located in the upper right corner.
8. Click S
MTP underneath Name.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
3
9. Type W
indows in the E
nter Name field and click Apply.
12. Select V
iew.
Challenge Questions:
1. Were there any Windows 10 hosts in the company-hq network that we have scanned? (10.0.2.0/24)
Part 3 - New Hosts
In this section, you will create an asset list of new hosts with critical vulnerabilities based on daily credentialed
scanning.
Part 3: Task 1 - Create an Asset List of New Hosts
Create an asset list of hosts discovered in the last 24 hours.
Step-by-step instructions:
1. Click A
ssets.
2. Click +
Add.
3. Click D
ynamic in the C
ustom section.
4. Type N
ewly discovered hosts in the N
ame field.
5. Mouse over “Any of the following are true:” in the Asset Definition section.
6. Click A
dd Rule.
7. Click the P
lugin ID drop-down, and then select D
ays Since Discovery.
9. Type 2
i n the next text field.
12. Click S
ubmit.
Challenge Questions:
2. If you were performing weekly scanning, how might you change this asset list?
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
4
Part 3: Task 2 - Create an Asset List of Hosts with Critical Vulnerabilities
Create an asset list of hosts with critical vulnerabilities.
Step-by-step instructions:
1. Click A
ssets.
2. Click +Add.
3. Click D
ynamic in the Custom s ection.
4. Type H
osts with critical vulnerabilities i n the Name field.
6. Click A
dd Rule.
7. Click the P
lugin ID drop-down, and then select S
everity.
10. Click S
ubmit.
Challenge Questions:
1. Why didn’t we set the plugin ID value when we were defining the severity?
1. Click A
ssets.
2. Click +
Add.
3. Click C
ombination in the C
ustom section.
4. Type N
ewly discovered hosts with critical vulnerabilities in the N
ame.
5. Type N
ewly in the Combination f ield (Do not copy/paste).
6. Select N
ewly Discovered Hosts.
9. Select H
osts with critical vulnerabilities.
10. Click S
ubmit.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
5
Challenge Questions:
2. If you used this filter in the analysis window, would you only see newly discovered critical
vulnerabilities?
End of Exercises
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
6
Answer Key
Part 1: Task 1
1. Click the triangular launch icon to the right of active-scanning. How many web servers were detected?
● 132 (this may be higher due to evolutions of the lab environment)
2. Does this number appear reasonable given the number of hosts identified in your vulnerability scans
from Lab 10?
● No. The original vulnerability scans had less than 20 hosts.
Part 1: Task 2
1. How many web servers were detected in HQ?
● 4 (this may be slightly higher due to evolutions of the lab environment)
2. Click the triangle to the right of active-scanning. What IP addresses at HQ have web servers?
● 10.0.2.5, 10.0.2.99, 10.0.2.244, 10.0.2.248 (may also include 10.0.2.245 & .246)
Part 1: Task 3
1. How many SMTP servers were found in the HQ range of 10.0.2.0/24?
● 2
2. How would you create an asset list just listing the SMTP servers in the HQ range?
● Do a combination asset list of “SMTP Servers” AND “companyname-hq”
Part 2: Task 1
1. Were there any Windows 10 hosts in the company-hq network that we have scanned? (10.0.2.0/24)
● Yes
Part 3: Task 1
1. Why did we use plugin ID 19506?
● Plugin ID 19506 is Nessus scan information, and is contained in every scan. It’s a good Plugin ID
to use to identify discovered hosts.
2. If you were performing weekly scanning, how might you change this asset list?
● Change the less than 2 value to less than 8.
Part 3: Task 2
1. Why didn’t we set the plugin ID value when we were defining the severity?
● We want to identify any plugin with a critical severity, not a specific one.
2. What is the critical rating based upon?
● CVSS v2 score 9-10
Part 3: Task 3
1. Is there another way we could have created this asset list?
● Yes, we could have created one asset list that had both the newly discovered hosts and hosts
with critical severity queries in one asset list.
2. If you used this filter in the analysis window, would you only see newly discovered critical
vulnerabilities?
● No, you’d see all vulnerabilities in hosts that are newly discovered and have a critical
vulnerability.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
7
rev 012921
1. Click A
nalysis and select V
ulnerabilities.
3. Click A
ll underneath Severity.
5. Click O
K.
6. Click A
pply All.
8. Click O
ptions.
9. Click S
ave Query.
12. Click S
ubmit.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
1
14. Click C
lear Filters.
15. Click L
oad Query.
17. Click A
pply.
18. Look in the upper right corner and note the number to the right of Total Results.
19. Click V
ulnerability Summary.
20. Select V
ulnerability list.
22. Click L
oad Query.
23. Select H
igh and Critical Vulnerabilities and click Apply.
24. Click O
ptions a
nd then click V
iew Settings.
27. Click S
ubmit.
28. Click A
nalysis and select Q
ueries.
Challenge Questions:
2. Go back and think about Steps 17 and 20 and the vulnerability counts? What is the difference between
Vulnerability Summary and Vulnerability List?
Part 1: Task 2 - Create and Save a Query of VPR 9 or Higher Items
You watched Tenable’s webinar on the Vulnerability Priority Rating (VPR) rating system, and would like to
develop a query that extracts Critical (9 or higher) VPR items.
Step-by-step Instructions:
1. Click A
nalysis and select V
ulnerabilities.
4. Click S
elect Filters.
7. Click A
ll underneath Vulnerability Priority Rating.
9. Replace the 0 to the right of Between with 9, so the statement reads “Between 9 and 10”.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
2
10. Click O
K.
11. Click A
pply All.
13. Click O
ptions and Save Query.
16. Click S
ubmit.
18. Click V
ulnerability List and select Vulnerability Detail List.
Challenge Questions:
1. Scroll down to the Vulnerability Priority Rating (VPR) Key Drivers. What is the Product Coverage? What
does that mean?
2. Scroll up to the section labeled Exploit Information. Are there any tools that can exploit this
vulnerability? If so, what are they?
Part 1: Task 3 - Create and Save a Query of Vulnerabilities Discovered in the Last Week
Create and schedule a weekly report that reports on all vulnerabilities discovered in the last week.
Step-by-step Instructions:
1. Click A
nalysis and select V
ulnerabilities.
2. From the V
ulnerability Analysis d
rop-down list, select V
ulnerability List.
4. If C
lear Filters is shown, click C
lear Filters.
5. Click S
elect Filters.
8. Click A
pply.
9. Click A
ll underneath V
ulnerability Discovered.
11. Click O
K.
12. Click A
pply All.
13. Click V
ulnerability List a
nd select Vulnerability Summary.
15. Click O
ptions a
nd select Save Query.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
3
16. In the Name b
ox, type Vulnerabilities discovered in the last 7 days
18. Click S
ubmit.
Challenge Questions:
1. Does this list show just vulnerabilities discovered in the last 7 days?
2. What can you do to fix this query so it only shows vulnerabilities that have been around for more than
7 days?
Part 2 - Remediation Analysis
Generate a list of MS bulletins and related actions.
Part 2: Task 1 - Create and Save a Query of all MS Bulletins, CVEs and Remediation Actions
Using Analysis tools, create and save queries for MS Bulletins, CVEs and Remediation actions.
Step-by-step Instructions:
1. Click A
nalysis a
nd select Vulnerabilities.
3. If C
lear Filters is shown, click C
lear Filters.
5. From the V
ulnerability Analysis d
rop-down list, select MS Bulletin Summary.
6. Click O
ptions and select Save Query.
7. In the Name b
ox, type MS Bulletins
8. In the Tag b
ox, type Microsoft Information
9. Click S
ubmit.
Challenge Questions:
1. Look at the first entry underneath MS Bulletin Summary. What does the two digit number represent?
2. If you wanted to show only MS Bulletins for the year 2019, what would you do?
Part 2: Task 2 - Create and Save a Query of CVEs
Step-by-step Instructions:
1. Click A
nalysis and select V
ulnerabilities.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
4
3. If C
lear Filters is shown, click C
lear Filters.
5. From the V
ulnerability Analysis d
rop-down list, select C
VE Summary.
6. Click O
ptions and select Save Query.
7. In the Name b
ox, type CVE List.
9. Click S
ubmit.
Challenge Questions:
1. Scroll down the list and look for CVE-2017-5715 in the left column and click it. What plugin searches for
this CVE?
2. If you wanted to look for this particular vulnerability, but only in Windows 10 hosts, what would you
do?
Part 2: Task 3 - Create and Save a Query of Remediation Actions
Step-by-step Instructions:
1. Click A
nalysis and select V
ulnerabilities.
3. If C
lear Filters is shown, click C
lear Filters.
6. Click O
ptions and select Save Query.
7. In the Name b
ox, type Remediations
9. Click S
ubmit.
2. Click Remediation Summary to the left of CVE Summary. Look at the number underneath CVEs for the
first item. Is it the same number that you got in question number 1? If not, why is it different?
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
5
Part 3 - Impact Analysis
Generate a list of queries of vulnerabilities that impact the confidentiality of data.
Part 3: Task 1 - Create a Query of CVSS v2 High Confidentiality Issues
Using CVSS v2 filtering, create a query that shows CVSS v2 vector of Confidentiality:complete vulnerabilities.
Step-by-step Instructions:
1. Click A
nalysis a
nd select Vulnerabilities.
2. From the V
ulnerability Analysis d
rop-down list, select V
ulnerability Summary.
4. Click S
elect Filters.
7. Click A
pply.
8. Click A
ll underneath CVSS v2 Vector.
9. Type C
:C
10. Click O
K.
11. Click A
pply All.
12. Click O
ptions and select Save Query.
14. Click S
ubmit.
Challenge Questions:
2. Why would a vulnerability that allows for theft of data not be a critical vulnerability?
Part 3: Task 2 - Create a Query of CVSS v3 High Confidentiality Issues
Using CVSS v3 filtering, create a query that shows CVSS v3 Confidentiality:High vulnerabilities.
Step-by-step Instructions:
1. Click A
nalysis a
nd select Vulnerabilities.
3. Click C
lear Filters.
4. Click S
elect Filters.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
6
6. Check the box next to CVSS v3 Vector.
7. Click A
pply.
8. Click A
ll underneath CVSS v3 Vector.
9. Type C
:H
10. Click O
K.
11. Click A
pply All.
13. Click O
ptions and Save Query.
15. Click S
ubmit.
Challenge Questions:
2. If you filtered on CVSS v2 vector and CVSS v3 vector, could you combine these results?
End of Exercises
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
7
Answer Key
Part 1: Task 1
1. Look at the list of queries. Do you see anything unexpected?
● Yes, we see two instances of the “High and Critical Vulnerabilities” query with the same name
but different tags. When we save a query, even if it is a query with the same name as an
existing query, it creates a new query.
2. Go back and think about Steps 17 and 20 and the vulnerability counts? What is the difference between
Vulnerability Summary and Vulnerability List?
● Vulnerability Summary is a list of vulnerabilities and the number of instances or hosts that
have that vulnerability. For example, if we have four hosts with the same vulnerability, you will
see one line. Vulnerability list is a complete list of vulnerabilities, so if two hosts have the
same vulnerability, it will appear twice in this list.
Part 1: Task 2
1. Scroll down to the Vulnerability Priority Rating (VPR) Key Drivers. What is the Product Coverage? What
does that mean?
● The answer will depend upon what vulnerability you selected. It can be; 1) Low, 2) Medium, 3)
High, or 4) Very High. This item indicates the number of unique products affected by the
vulnerability.
2. Scroll up to the section labeled Exploit Information. Are there any tools that can exploit this
vulnerability? If so, what are they?
● The answer to this will depend upon the vulnerability. If there are any items in this section, it
will indicate what applications can be used to actually test the existence of the vulnerability.
Examples include Canvas, Core Impact, Metasploit and malware. With respect to Metasploit, it
will enumerate the payload that should be used.
Part 1: Task 3
1. Does this list show just vulnerabilities discovered in the last 7 days? If not what else is it showing?
● No, it also shows informational items and compliance items.
2. What can you do to fix this query so it only shows vulnerabilities that have been around for more than
7 days?
● Change Within the last 7 days to More than 7 days ago in the Vulnerability Discovered filter.
Part 2: Task 1
1. Look at the first entry underneath MS Bulletin Summary. What does the two digit number represent?
● The year
2. If you wanted to show only MS Bulletins for the year 2019, what would you do?
● Open the filter and create a filter on MS Bulletin ID with a value of MS19. Note: You do not need
to use a wildcard for this filter; it treats any filter here as contains.
Part 2: Task 2
1. Scroll down the list and look for CVE-2017-5715 in the left column and click it. What plugin searches for
this CVE?
● Nessus plugins search for this vulnerability; however, there are also many passive plugins that
search for it as well. We can tell that the Nessus plugin is 105616 because it is the only plugin
that looks specifically for the vulnerability described in the CVE and not additional
vulnerabilities or combinations. We know some of the other plugins are passive by looking at
the plugin family.
2. If you wanted to look for this particular vulnerability, but only in Windows 10 Hosts, what would you
do?
● Filter these results on the Windows 10 asset list.
Part 2: Task 3
1. How many unique CVEs does this patch fix?
● This answer will depend upon the Remediation action that is selected. It can be located by
looking at the number to the right of Total Results in the upper right corner.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
8
2. Click Remediation Summary to the left of CVE Summary. Look at the number underneath CVEs for the
first item. Is it the same number as number one? If not, why is it different?
● No, it will be a different number. The reason for this is that the results in the CVE Summary
Window count unique CVEs. The number in the Remediations window is total CVEs. If two hosts
are subject to the same CVE, it will count twice (and three times if it applies to three hosts, and
so on).
Part 3: Task 1
1. Are all the vulnerabilities listed critical vulnerabilities?
● No
2. Why would a vulnerability that allows for theft of data not be a critical vulnerability?
● Because the vulnerability may not allow someone to gain administrative privileges on a host
but still allow the theft of data.
Part 3: Task 2
1. Are the vulnerability counts the same as the previous filter?
● No
2. If you filtered on CVSS v2 vector and CVSS v3 vector, could you combine these results?
● No, it would give you a logical AND filter not an OR.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
9
rev 012921
1. Click D
ashboard and select Dashboard.
2. Click O
ptions and select Add Dashboard.
3. Type V
PR in the S
earch Templates box, and press Enter.
5. Scroll down to S
chedule and click E
very day at.
6. Select 0
8:00 from the Time d
rop-down list.
7. Click A
dd.
8. Wait for the dashboard to populate. If any object does not populate, mouse over its t itle bar, click the
gear icon in the upper right corner and select R
efresh.
Challenge Questions:
1. Look at the component VPR Summary - CVSS to VPR Heat Map. When prioritizing remediation
activities, which cell of the chart is the one that should be considered first?
2. Click the cell in the lower right corner of VPR Summary - CVSS to VPR Heat Map. Click Vulnerability List
and change the Analysis Tool to V ulnerability Summary. How many unique vulnerabilities have a VPR
score of 9 or higher, and have a CVSS score of 9 or higher?
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
1
3. Click the > > in the upper left corner to open the filters. Find V
ulnerability Priority Rating and click the
x in the upper right corner to remove it. Click A pply All. H
ow many unique vulnerabilities have a
Critical vulnerability rating? How does this compare to the number in Step 2? What does this mean?
Part 1: Task 2 - Deploy a Dashboard Template
Deploy the Getting Started with Tenable.sc Using SLAs dashboard.
Step-by-step Instructions:
1. Click D
ashboard and select Dashboard.
2. Click O
ptions and select Add Dashboard.
3. Type S
LA’s Dashboard in the S
earch Templates box.
4. Click the a
rrow to the right of G
etting Started with Tenable.sc Using SLA’s.
6. Select 0
8:00 from the Time drop-down list.
7. Click A
dd.
8. Wait for the dashboard to populate. If any object does not populate, mouse over the t itle bar, click the
gear icon in the upper right corner and select R
efresh.
Challenge Questions:
1. In the left column, look at the component in the upper left corner titled SLA Progress - Unmitigated
Vulnerabilities. Look to the right at the top chart in the middle column SLA Progress - Unmitigated
Vulnerabilities by VPR Score. Is there a difference in these charts? If so, what is the difference?
2. Which of these two charts uses probability of compromise in its severity calculation?
Part 1: Task 3 - Modify the SLA Progress
Components of templates can be modified to meet specific needs. In this task you will change the time
frame for SLAs.
Step-by-step Instructions:
1. In the middle column, the first component is titled S LA Progress - Unmitigated Vulnerabilities by VPR
Score. Mouse over the t itle bar, click the g
ear icon on the right and select Edit.
2. Change the Critical SLA to 7 days. Mouse over the first column second row, C
ritical (SLA 3 Days), click
the g
ear i con and select Edit Header.
4. Click S
ubmit.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
2
8. Click the c heck mark on the right.
9. Click S
ubmit.
10. Click S
ubmit.
1. Look at the SLA Progress - Unmitigated Vulnerabilities by VPR Score component. Is there anything
wrong with this chart? If so, what?
1. In the middle column, the first component is titled S LA Progress - Unmitigated Vulnerabilities by VPR
Score. Mouse over the t itle bar, click the g
ear icon on the right and select Edit.
2. The first row, second column is labeled Within SLA. Click the cell directly underneath Within SLA.
6. Click S
ubmit.
7. Click S
ubmit.
2. What other components of this dashboard do we need to change with this different SLA?
Part 1: Task 5 - Deploy the CVSS Base Risk Host Matrices Dashboard
Step-by-step Instructions:
1. Click O
ptions and select Add Dashboard.
2. In the Search Templates box, type CVSS Base Risk Host Matrices and press Enter.
3. Click the a
rrow to the right of C
VSS Base Risk Host Matrices.
4. Scroll down to S
chedule and click E
very day at.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
3
5. From the Time drop-down list select 08:00.
6. Click A
dd.
7. Wait for the dashboard to populate. If any object does not populate, mouse over the t itle bar, click the
gear icon in the upper right corner and select R
efresh.
Challenge Questions:
1. What components on this dashboard break down vulnerabilities based upon impact?
1. Click O
ptions and select Add Dashboard.
2. Under the C
ustom area, click A
dvanced.
3. In the Name b
ox, type Companyname-HQ
4. To the right of Layout, click the fifth item (one narrow and one wide column).
5. Click S
ubmit.
Challenge Questions:
1. Click D
ashboard and select D
ashboard.
2. Click S
witch Dashboard and select VPR Summary.
3. Locate the component V PR Summary - Vulnerability Trending over the last 90 days and click the g
ear
icon in the upper right corner of the component.
4. Select C
opy.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
4
5. Click the drop-down list to the right of Dashboard, and select C
ompanyname-HQ.
6. Click C
opy.
7. Click S
witch Dashboard and select Companyname-HQ.
8. Click the g
ear icon in the upper right corner of Copy of VPR Summary - Vulnerability Trending over the
last 90 days a nd select Edit.
11. Click A
dd Filter.
12. Click S
elect a Filter a
nd select Asset.
16. Click S
ubmit.
18. Click A
dd Filter.
19. Click S
elect a Filter a
nd select Asset.
21. Select C
ompanyname-hq.
23. Click S
ubmit.
25. Click A
dd Filter.
26. Click S
elect a Filter a
nd select Asset.
28. Select C
ompanyname-hq.
30. Click S
ubmit.
32. Click A
dd Filter.
33. Click S
elect a Filter a
nd select Asset.
35. Select C
ompanyname-hq.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
5
36. Click the c heck mark to the right.
37. Click S
ubmit.
38. Click S
ubmit.
Challenge Questions:
2. When might you choose to use the copy function rather than using a pre-existing component
template?
Part 2: Task 3 - Add Components to Dashboard
The Security team would like this dashboard to focus on HQ, with the following components:
1. CVSS to VPR Heat Map
2. Unmitigated Vulnerabilities by VPR Score
3. CVSS Base Risk Host Matrix - Confidentiality (C), Availability (A), Integrity (I) Impact Risk Ratios
Step-by-step Instructions:
1. Click S
witch Dashboard and select Companyname-HQ.
2. Click O
ptions and select Add Component.
3. In the Search Templates box, type “VPR Heat Map” (with quotation marks) and press E
nter.
4. Click the a
rrow to the right of the line labeled V
PR Summary - CVSS to VPR Heat Map.
5. Click the drop-down list to the right of Targets and select Assets.
8. From the R
epositories drop-down list, select (check) active-scanning.
10. Select 0
7:00 from the T
ime drop-down list.
11. Click A
dd.
b. CVSS Base Risk Host Matrix - Confidentiality (C), Availability (A), Integrity (I) Impact Risk Ratios
Note: Don’t forget to use quotation marks when searching for dashboard templates.
Challenge Questions:
2. Why didn’t we just copy the component(s) from the existing dashboards onto the new dashboard?
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
6
Part 2: Task 4 - Create a Pie Chart of Compliance Data
Create a pie chart of compliance data for HQ in the left column of the dashboard that shows relative passes,
failures and advisories on controls.
Step-by-Step Instructions:
1. Click S
witch Dashboard and select Companyname-HQ.
2. Click O
ptions and select Add Component.
3. Click P
ie Chart.
4. Type C
ompliance i n the Name box.
6. Click +
Add Filter to the right of F ilters.
7. Click S
elect a Filter and select P
lugin Type.
8. Next to P
lugin Type, select Compliance.
10. Click +
Add Filter and select A
sset.
14. Click R
esults Displayed and select 5
.
15. Click S
ubmit.
2. How can you find out the absolute value for compliance failures?
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
7
End of Exercises
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
8
Answer Key
Part 1: Task 1
1. Look at the component “VPR Summary - CVSS to VPR Heat Map”. When prioritizing remediation
activities which cell of the chart is the one that should be considered first?
● Typically you will want to start in the lower right corner (VPR 9-10 and CVSS 9-10)
2. Click the cell in the lower right corner of VPR Summary - CVSS to VPR heat map. Click Vulnerability List
and change the Analysis Tool to Vulnerability Summary. How many unique vulnerabilities have a VPR
score of 9 or higher, and have a CVSS score of 9 or higher?
● The answer will vary, however what is important to note is when changing to the Vulnerability
summary tool, the number goes down, because there are several hosts that have the same
vulnerability.
3. Click the >> in the upper left corner to open the filter. Then click the x in the upper right corner of
Vulnerability Priority Rating. Click Apply All. How many unique vulnerabilities have a Critical
vulnerability rating? How does this compare to the # in step 2? What does this mean?
● By eliminating the VPR as part of the filter, the unique vulnerability count should increase
significantly. This means that this network has several critical vulnerabilities that are unlikely
to be used as a point of compromise. In terms of prioritization, these vulnerabilities should
have a lower priority rating when compared with the ones identified in Step 2.
Part 1: Task 2
1. In the left column look at the component in the upper left corner titled “SLA Progress - Unmitigated
Vulnerabilities.” Look to the right at the Top chart in the middle column “SLA Progress - Unmitigated
Vulnerabilities by VPR Score”. Is there a difference in these charts? If so, what is the difference?
● The chart on the left determines SLA level based upon CVSS vulnerability, vs. the one in the
middle column uses Vulnerability Priority Rating. The SLA’s differ with Critical SLA 30 days vs.
Critical SLA 3 Days, High 60 vs. 10 Days, and Medium 90 vs. 30 Days.
2. Which of these two charts uses probability of compromise in its severity calculation?
● The one in the middle. CVSS, as part of its severity calculation, does not include probability of
compromise. Vulnerability Priority Rating does.
Part 1: Task 3
1. Look at the SLA Progress - Unmitigated Vulnerabilities by VPR Score Component. Is there anything
wrong with this chart? If so, what?
● In the first row, the Total Vulnerabilities should be the sum of Within SLA and Overdue. It is
less.
2. What should we change about this chart?
● The second value in the first row, Within SLA has a rule that is 0-3 days. With the requested
change, this needs to be 0-7.
Part 1: Task 4
1. Does the chart look right now?
● Yes
2. What other components of this dashboard do you need to change with this different SLA?
● There are several charts that need to be updated, including; 1) Mitigated Vulnerabilities, 2)
Mitigated Vulnerabilities by VPR score and 3) Unmitigated Vulnerabilities
Part 1: Task 5
1. What components on this dashboard break down vulnerabilities based upon impact?
● The top two components in the right column both break down vulnerabilities based upon
Impact if compromised.
2. What is the difference between the two?
● The first chart includes raw vulnerability counts, the second chart is based upon percentage of
vulnerabilities.
Part 2: Task 1
1. When creating dashboards, what are narrow columns good for?
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
9
There are several possibilities, but pie charts and tables with a low number of columns are two
●
good examples.
2. When creating dashboards, what are wide columns good for?
● There are several good answers, but line charts, large matrices and tables with a large number
of columns are some good examples.
Part 2: Task 2
1. Is there a faster way to create this component?
● Yes, use the templated component and set the focus range.
2. When might you choose to use the copy function rather than using a pre-existing component
template?
● If you have designed a custom component that you want to replicate, or if you’ve modified a
component template and want to keep those modifications in another component.
Part 2: Task 3
1. What other approaches are there to creating individual components on dashboards?
● 1) Creating a custom component by hand, 2) Copying a component from one dashboard to
another.
2. Why didn’t we just copy the component(s) from the existing dashboards onto the new dashboard?
● The companyname-HQ dashboard needs all components created with a focus of the asset list
companyname-HQ. There is no way when copying a component to change its focus. For all
items in the component. If we had copied the component, we would have had to edit every cell
inside each matrix. It was faster just to re-deploy the component with the component focused
on the asset list at the beginning.
Part 2: Task 4
1. How can you move this pie chart to a different column?
● Drag and drop the component into the column you want.
2. How can you find out the absolute value for compliance failures?
● Mouse over the pie chart and then move over to the orange (High) item.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
10
rev 012921
1. Click A
nalysis a
nd select Vulnerabilities.
2. Click >
> in the upper left to open the filters.
4. Click S elect Filters and confirm that the V ulnerability Priority Rating filter is checked. If it is not, select
the c heck box to the left of V
ulnerability Priority Rating.
5. Click A
pply.
6. Click A
ll underneath Vulnerability Priority Rating.
7. Click A
ll and select C
ustom Range.
9. Click O
K and click Apply All.
12. Click O
ptions and select Export as PDF.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
1
13. Type V
PR 9 or higher items inside the box for Name
19. Click S
ubmit.
20. Click R
eporting a
nd select Report Results. Wait for the report to finish.
21. Click the download button to the right of the VPR 9 or higher items r eport results.
1. Click D
ashboard and select D
ashboard.
2. Click S
witch Dashboard and select VPR Summary.
3. Click O
ptions and select Send to Report.
4. Click S
ubmit.
5. Click R
eporting a
nd select Report Results.
7. Click R
eports.
8. Click the L
aunch button to the right of the VPR Summary l ine.
9. Click R
eport Results.
1. If you wanted to use the graphics on this dashboard, but add contents and move some of them, what
would you do?
2. How many chapters did this report create and what were they named?
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
2
Part 2 - Stakeholder Report
The Executives would like a report of overall risk on the first of the month. Generate a report using the Executive
VPR Summary Report to be run monthly on the first day of the month and deliver it to
[email protected]. Create a report for the System Administrators for remediation.
The Security Officers would like a report of mitigation of vulnerabilities. The Compliance team would like a
compliance report.
Part 2: Task 1 - Executive VPR Summary Report
Create a report from the Executive VPR Summary Report Template.
Step-by-step Instructions:
1. Click R
eporting and select R
eports.
2. Click +
Add in the upper right corner.
5. Click A
dd.
6. Click the g
ear icon to the right of E
xecutive VPR Summary Report and select E
dit.
7. Click O
n Demand to the right of S
chedule.
8. Click O
n Demand underneath Frequency and select M
onthly.
10. In the Day box, enter the first day of next month (ex: 1 0/1/2020).
11. Click S
ubmit.
13. Click R
eport Results and wait for the report to finish.
2. If you wanted this same report, but only for Windows hosts, how would you do it?
Part 2: Task 2 - Remediation Instructions by Host Report
The System Administrators at HQ would like a report that provides a list of patches for their hosts. Prepare a
report using the Remediations Instructions by Host report, setting the focus range to the asset list
companyname-hq.
Step-by-step Instructions:
1. Click R
eporting and select R
eports.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
3
2. Click +
Add in the upper right corner.
3. In the Search Templates box, type “Remediation Instructions by Host” ( with the quotes) and press
Enter.
4. Click the a
rrow to the right of R
emediation Instructions by Host Report.
5. Click A
ll Systems to the right of T
argets and select A
ssets.
8. Click A
dd.
9. Click the L
aunch button to the right of R
emediation Instructions by Host Report.
10. Click R
eport Results and wait for the R
emediation Instructions by Host Report to finish.
1. Scan through the report. Are there any sections of the report that are either empty, or are not relevant
to vulnerability remediation? If so, how would you delete them?
2. The Active Remediation Instructions by Host chapter provides a table of Top 20 Hosts. How would you
change this to be the top 10 hosts?
Part 2: Task 3 - Edit the Remediation Instructions by Host Report
Remove the references to passive data (PVS or NNM) and compliance from the Remediation Instructions by
Host report.
Step-by-step Instructions:
1. Click R
eports.
2. Click the g
ear icon to the right of R
emediation Instructions by Host Report and select E
dit.
3. Click D
efinition.
4. Click the p
encil icon to the right of 1.1.1.
5. Replace the following sentence: By leveraging the capabilities of SecurityCenter, Nessus and Passive
Vulnerability Scanner (PVS), security teams can more easily identify hosts with vulnerabilities
requiring remediation in order to more effectively secure their network.
With this text: B
y leveraging the capabilities of Tenable.sc and Nessus, security teams can more easily
identify hosts with vulnerabilities requiring remediation in order to more effectively secure their
network.
6. Click S
ubmit.
7. Click the p
encil icon to the right of 1.1.2.
9. Click S
ubmit.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
4
10. Click the p
encil icon to the right of 1.1.3.
13. Click S
ubmit.
14. Mouse over the chapter Passive Remediation Instructions by Host and click the trash can i con.
15. Mouse over the chapter Compliance Remediation Instructions by Host and click the t rash can icon.
16. Click S
ubmit.
18. Click R
eport Results and wait for the report to finish.
1. If you wanted to change this new report to report on only hosts in headquarters, how would you do
that?
2. If you wanted to email this report right now to someone, how would you do it?
Part 2: Task 4 - Mitigation Summary Report
The Security team is getting pressure to measure how quickly vulnerabilities are being mitigated. Create a
report using the mitigation summary template.
Step-by-step Instructions:
1. Click R
eports.
2. Click +
Add.
3. Click the box labeled Search Templates and type “Mitigation Summary” a
nd press E
nter.
5. Click A
dd.
7. Click R
eport Results and wait for the report to finish.
8. Click the D
ownload button to the right of Mitigation Summary Report. When the report downloads,
open it with a PDF reader.
Challenge Questions:
1. There are two tables with Summary by Severity in section 3.2 (Vulnerability Summaries). What is being
used to calculate severity?
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
5
Part 2: Task 5 - Compliance Report
The Compliance team is starting to work on regular compliance scans in headquarters and wants a report
on the results of their work. Prepare a report using the CIS Microsoft Windows Server 2016 v1.1.0 Template.
Step-by-step Instructions:
1. Click R
eports.
2. Click +
Add in the upper right corner.
3. In the Search Templates box, type “CIS Microsoft Windows Server 2016 v1.1.0” a
nd press E
nter.
4. Click the a
rrow to the right of C
IS Microsoft Windows Server 2016 v1.1.0.
8. Click A
dd.
9. Click the L
aunch button to the right of CIS Microsoft Windows Server 2016 v1.1.0.
10. Click R
eport Results and wait for the report to finish.
1. Click R
eports.
2. Click the g
ear icon to the right of E
xecutive VPR Summary Report and select Edit.
3. Click D
efinition.
5. In the Name b
ox, type Compliance
6. Click S
ubmit.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
6
7. Mouse over C
ompliance and click Add Element.
8. Click P
ie Chart.
11. Click +
Add Filter.
12. Click S
elect a Filter and select P
lugin Type.
15. Click S
ubmit.
16. Click S
ubmit.
18. Click R
eport Results and wait for the report to finish.
20. Scroll to the bottom and view the new pie chart.
Challenge Questions:
1. If you wanted the pie chart to reflect the results of a specific audit file, what would you do?
2. If you wanted to limit the compliance to a specific operating system, what would you do?
Part 3: Task 2 - Edit Remediation Instructions by Host Report
Add a chapter to the end of the Remediation Instructions by Host report. In that chapter, insert a table of
remediation items for VPR 9 or higher items.
Step-by-step Instructions:
1. Click R
eports.
2. Click the g
ear icon to the right of R
emediation Instructions by Host Report and select E
dit.
3. Click D
efinition.
5. In the Name b
ox, type VPR 9 or Higher Remediations
6. Click S
ubmit.
7. Mouse over V
PR 9 or Higher Remediations and click Add Element.
8. Click T
able.
9. In the Name b
ox, type Remediation of VPR 9 or Higher Items
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
7
11. Click +
Add Filter.
12. Click S
elect a Filter and select V
ulnerability Priority Rating.
13. Click A
ll and select Custom Range.
17. Click S
ubmit.
19. Click R
eport Results and wait for the report to finish.
1. How would you change the VPR 9 or Higher Remediations table so it only showed remediations that
have been available for more than 30 days?
2. How would you change the VPR 9 or Higher Remediations table so it showed remediations for VPR 9 or
higher vulnerabilities that have been discovered for the first time in the last 7 days?
End of Exercises
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
8
Answer Key
Part 1: Task 1
1. What column did this report sort on?
a. Host Total
2. Did this report save as a template you can rerun?
a. No
Part 1: Task 2
1. If you wanted to use the graphics on this dashboard, but add contents and move some of them, what
would you do?
a. D eploy the dashboard as a report and then edit the report.
2. How many chapters did this report create and what were they named?
a. One, and it has the name of the Dashboard–in this case, VPR Summary
Part 2: Task 1
1. If you wanted to eliminate the chapter called About this Report, how would you do it?
● Edit the report and delete the first chapter.
2. If you wanted this same report, but only for Windows hosts, how would you do it?
● Recreate the report using the same template, but set the focus to the asset list Windows hosts.
Part 2: Task 2
1. Scan through the report, are there any sections of the report that are either empty, or are not relevant
to vulnerability remediation? If so, how would you delete them?
● Yes, there are two sections: one with remediation instructions for Passive Detections and
another for Compliance Remediation instructions, that are not what was asked for. You can
delete the chapters on Passive and Compliance remediation to eliminate this information. You
would also want to edit the opening paragraphs to eliminate the references to NNM and
compliance data.
2. The Active Remediation Instructions by Host chapter provides a table of Top 20 Hosts. How would you
change this to be the top 10 hosts?
● You would edit the Top 20 Host Summary Host Summary so the result displayed is 10 instead
of 20.
Part 2: Task 3
1. If you wanted to change this new report to report on only hosts in headquarters, how would you do
that?
● Use the Find/Update filters feature to add the Asset List companyname-hq in all cases where
the Asset list is not set. I f you deployed from the Template, you would have to go through and
edit and remove all those items again.
2. If you wanted to email this report right now to someone, how would you do it?
● Click the gear icon to the right of the report and select email. If you edited the distribution
section of the report template, the email would only be delivered the next time the report was
run.
Part 2: Task 4
1. There are two tables with Summary by Severity in section 3.2. What is being used to calculate severity?
● CVSS Score is used to identify severity.
2. How would you change this chart to use VPR instead?
● Edit each table and each cell in each table and change the filter for severity with a VPR filter as
appropriate. N ote: There is no VPR option in Update on the Find/Update filters page AND the
Find/Update filter option is global, and cannot be limited to a specific section or chapter.
Part 2: Task 5
1. Review the report. Is it limited to hosts in HQ?
● Yes.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
9
Part 3: Task 1
1. If you wanted the pie chart to reflect the results of a specific audit file, what would you do?
● Edit the pie chart and add a filter for Audit File in the Data section
2. If you wanted to limit the compliance to a specific operating system, what would you do?
● Edit the pie chart and add a filter for Operating System.
Part 3: Task 2
1. How would you change the VPR 9 or Higher Remediations table so it only showed remediations that
have been available for more than 30 days?
● Add a filter to the table for Patch Published more than 30 days ago.
2. How would you change the VPR 9 or Higher Remediations table so it showed remediations for VPR 9 or
higher vulnerabilities that have been discovered for the first time in the last 7 days?
● Add a filter to the table for Vulnerability Discovered in the last 7 days.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
10
rev 012921
1. Click D
ashboard and select Assurance Report Cards.
2. Click +
Add.
4. Locate CSF IDENTIFY.Risk Assessment (ID.RA) and click the arrow to the right.
5. Click E
very Day to the right of Schedule.
6. Click D
aily underneath F requency. Then select w
eekly.
7. Click the T
ime box and select 08:00.
8. Look underneath R
epeat On and make sure the box for M
is highlighted, and all other boxes are not.
You can change them by clicking them.
9. Click A
dd.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
1
10. Click the t riangle to the right of CSF IDENTIFY.RISK ASSESSMENT (ID.RA).
11. Wait for the CSF Identify.Risk Assessment report card to evaluate.
Challenge Questions:
2. Look at the statement for item 1. What changes might need to be made depending upon the Tenable.sc
deployment?
Part 1: Task 2 - Edit the Report Card
The CSF Identify Risk Assessment report contains policy statements using passive data. Remove the passive
data from the query and rephrase the policy statements.
Step-by-step Instructions:
1. Click D
ashboards a
nd select Assurance Report Cards.
2. Click O
ptions a
nd select Manage Arcs.
4. Click A
ll underneath N
ame and type CSF
5. Click A
pply.
7. Click the g
ear icon to the right of C
SF IDENTIFY.Risk Assessment (ID.RSA) and select E
dit.
8. Mouse over the policy statement 1. At least 80% of actively and passively detected systems have been
scanned in the last 14 days and click the pencil icon on the right.
14. Click S
ubmit once more.
Challenge Questions:
2. Will changing this asset list have any impact on the efficiency of the evaluation of this policy
statement?
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
Part 2 - Create SLA Assurance Report Cards
Create an Assurance Report Card titled “SLAs” with two policies: No critical vulnerabilities more than 14 days
old, and no high vulnerabilities more than 30 days old. Have the drill-down show the vulnerabilities that do not
meet the SLA.
1. Click D
ashboard.
2. Select A
ssurance Report Card.
3. Click O
ptions.
4. Select A
dvanced Add.
5. Type S
LA Report Card in the box labeled N
ame.
6. Click E
very Day t o the right of S
chedule.
7. Click D
aily underneath F requency.
8. Select W
eekly.
11. Click +
Add Policy Statement.
12. Type N
o Critical vulnerabilities more than 14 days old.
13. Click R
atio (X/Y) and select Compliant/Non-Compliant.
14. Click +
Add Filter to the right of Base Filter.
15. Click S
elect a Filter a
nd type Repositories.
16. Click R
epositories.
20. Click +
Add Filter to the right of C
ompliant Filters.
21. Click S
elect Filter u
nderneath Compliant Filter a
nd select Severity.
24. Click +
Add Filter u
nderneath S
everity.
25. Click S
elect a Filter and select V
ulnerability Discovered.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
26. Click W
ithin the last day and select Custom range.
30. Click A
ll to the left of hosts a
nd select No.
31. Click H
osts and select Vulnerabilities.
32. Click +
Add Filter t o the right of Drill Down Filters.
33. Click S
elect Filter u
nderneath Drill Down Filters a
nd select Severity.
36. Click +
Add Filter underneath Severity.
37. Click S
elect a Filter and select V
ulnerability Discovered.
38. Click W
ithin the last day and select Custom range.
42. Click S
ubmit.
43. Click S
ubmit again.
44. Click D
ashboard.
45. Select A
ssurance Report Cards.
1. Has the organization met their SLA for remediation of critical vulnerabilities?
2. Why did we add the Repository filter to the Base in the policy statement?
3. Why didn’t we add the Repository filter to the Compliant condition section?
Part 2: Task 1 - Add the High Vulnerability Policy to the Report Card
Add the “no high vulnerabilities more than 30 days old policy” to the SLA Report Card.
Step-by-step Instructions:
1. Click D
ashboard.
2. Select A
ssurance Report Card.
3. Click O
ptions.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
4. Select M
anage ARCs.
5. Click the g
ear icon to the right of S
LA Report Card. You may need to clear filters.
6. Select E
dit.
7. Click +
Add Policy Statement.
8. Type N
o High vulnerabilities more than 30 days old.
9. Click R
atio (X/Y) and select Compliant/Non-Compliant.
10. Click +
Add Filter t o the right of Base Filter.
11. Click S
elect a Filter a
nd type Repositories
12. Click R
epositories.
16. Click +
Add Filter t o the right of Compliant Filters.
17. Click S
elect Filter u
nderneath Compliant Filter a
nd select Severity.
20. Click +
Add Filter u
nderneath S
everity.
21. Click S
elect a Filter a
nd select Vulnerability Discovered.
22. Click W
ithin the last day and select More than 30 days ago.
24. Click A
ll to the left of hosts a
nd select No.
25. Click H
osts and select Vulnerabilities.
26. Click +
Add Filter t o the right of Drill Down Filters.
27. Click S
elect Filter u
nderneath Drill Down Filters a
nd select Severity.
30. Click +
Add Filter u
nderneath S
everity.
31. Click S
elect a Filter a
nd select Vulnerability Discovered.
32. Click W
ithin the last day and select More than 30 days ago.
34. Click S
ubmit.
35. Click S
ubmit.
36. Click D
ashboard.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
37. Select A
ssurance Report Cards.
2. If you wanted to create this same report just for Headquarters, what is the easiest way to do it?
Part 3 - Use a Report Card in a Report
Create a report that has the Windows eport card.
2. Click on +Add.
8. Click on Add.
Part 3: Task 2 - Create a report and insert the report card
Create a report that includes the Windows Report Card and have it run at 9:30AM U.S. Eastern Time on
[email protected].
mondays. Deliver it to e
Step-by-step Instructions:
1. Click R
eporting a
nd select Reports.
2. Click +
Add.
3. Click P
DF.
9. Type Click O
n Demand to the right of Schedule.
10. Click O
n Demand u
nderneath Frequency and select Weekly.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
12. If M
i s not highlighted underneath Repeat On, click M
.
13. If there are any other days highlighted, click them to remove them.
14. Click D
efinition.
15. Click +
Add Chapter.
16. Type W
indows Server Report Card i n the Name box.
17. Click S
ubmit.
19. Click A
ssurance Report Card.
20. Type W
indows Server Report Card in the N
ame box.
22. Click S
ubmit.
23. Click S
ubmit.
25. Click R
eport Results and wait for the report to finish.
27. Click R
eport Results. When the report downloads, view the file with a PDF reader.
Challenge Questions:
1. What is different in this report when compared to what you saw on the screen?
1. Click D
ashboard and select A
ssurance Report Cards.
2. Click O
ptions a
nd select Advanced Add.
3. Type C
ompliance Report Card.
4. Click E
very day n
ext to S
chedule.
5. Click D
aily underneath F requency a
nd select Monthly.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
6. Click the T
ime drop-down and select 08:00.
7. Click the D
ay box and select the first day of next month.
8. Click +
Add Policy Statement.
9. Type N
o more than 30% of hosts have compliance failures.
10. Click R
atio(x/y) and select P
ercentage (%).
11. Click +
Add Filter to the right of B
ase Filters.
12. Click S
elect a Filter a
nd select Repositories.
15. Click +
Add Filter to the right of Compliant Filters.
16. Click S
elect a Filter a
nd type severity.
17. Click S
everity.
22. Click +
Add Filter t o the right of Drilldown Filters.
23. Click S
elect a Filter a
nd type severity.
24. Select S
everity.
27. Click S
ubmit.
28. Click S
ubmit once more.
29. Click D
ashboard and select A
ssurance Report Cards.
1. Are there any potential concerns with the way this policy was written that could cause inaccuracies?
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
Part 4: Task 2 - Add Second Policy to the Report
Add the second policy statement, no compliance failure more than 60 days old, to the Compliance report
card.
Step-by-step Instructions:
1. Click D
ashboard and select A
ssurance Report Cards.
2. Click O
ptions a
nd select Manage ARCs.
3. Click the g
ear icon to the right of C
ompliance Report Card and select Edit.
4. Click +
Add Policy Statement.
5. Type N
o compliance failures more than 60 days old.
6. Click R
atio (x/y) and select Compliant/Non-Compliant.
7. Click +
Add Filter to the right of B
ase Filters.
8. Click S
elect a Filter, t ype repositories and select Repositories.
11. Click +
Add Filter t o the right of Compliant Filter.
12. Click S
elect a filter a
nd type severity.
13. Click S
everity.
16. Click +
Add Filter u
nderneath S
everity.
17. Click S
elect a Filter a
nd type vulnerability.
18. Select V
ulnerability Discovered.
19. Click W
ithin the Last Day and select C
ustom Range.
23. Click A
ll to the right of C
ompliant Condition and select No.
24. Click +
Add Filter t o the right of Drilldown Filters.
25. Click S
elect a Filter a
nd type severity
26. Select S
everity.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
29. Click +
Add Filter u
nderneath S
everity.
30. Click S
elect a Filter a
nd type repositories
31. Select R
epositories.
34. Click +
Add Filter u
nderneath R
epositories.
35. Click S
elect a Filter a
nd type vulnerability
36. Select V
ulnerability Discovered.
37. Click W
ithin the last day and select Custom Range.
41. Click S
ubmit.
42. Click S
ubmit once more.
43. Click D
ashboard and select A
ssurance Report Cards and wait for the report card to evaluate.
Challenge Questions:
1. Would changing the order of the filters on any of the policy statements change the results?
2. Would changing the order of the filters on any of the policy statements improve the efficiency of
generating results?
End of Exercises
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
Answer Key
Part 1: Task 1
1. Does the organization pass on all items on the report card?
● No, they fail on at least 8 items.
2. Look at the statement for item 1. What changes might need to be made depending upon the Tenable.sc
deployment?
● If the customer is not running Nessus Network Monitor or some other passive monitoring
system, statement #1 might be misleading.
Part 1: Task 2
1. Why did we change the asset list on the base filter?
● To only include actively scanned hosts in the population of hosts for the policy statement
2. Will changing this asset list have any impact on the efficiency of the evaluation of this policy
statement?
● Yes, the policy statement should run more quickly, and put less load on Tenable.sc.
Part 2: Task 1
1. Has the organization met their SLA for remediation of critical vulnerabilities?
● No.
2. Why did we add the Repository filter to the Base in the policy statement?
● To eliminate compliance results.
3. Why didn’t we add the Repository filter to the Compliant condition section?
● Any filter in the Base is automatically applied to the Compliant section.
Part 2: Task 2
1. Does the organization meet their SLA for high vulnerabilities?
● No
2. If we wanted to create this same report for just headquarters, what is the easiest way to do it?
● Copy the SLA Report Card. Then rename the report card and change the focus range to the
asset list companyname-hq. Then click the pin on the report card to show it, and go to
Dashboards/Assurance Report Cards.
Part 3: Task 2
1. What is different in this report when compared to what you saw on the screen?
● The Compliant/Non-compliant column we saw on the dashboard is not in the report.
2. If we ran this report on Tuesday, would it update with new results?
● No, the report only copies the results from the report card, which only updates once per week.
Part 4: Task 1
1. Are there any potential concerns with the way this policy was written that could cause inaccuracies?
● Yes, if non compliance (a.k.a. vulnerability) data were accidentally placed in the
active-scanning-compliance or Compliance repositories, the results would be inaccurate.
2. If so, how could you resolve those concerns?
● In the Compliant filter and the Drilldown filter add an additional item for Plugin Type
Compliance.
Part 4: Task 2
1. Would changing the order of the filters on any of the policy statements change the results?
● No, as long as all the filters were the same.
2. Would changing the order of the filters on any of the policy statements improve the efficiency of
generating results?
● Yes. Typically when you create filters, you want the order to be the filters that eliminate
greater data from additional queries first. For example, placing repositories first rather (thus
eliminate all the data from a given repository) than later will improve efficiency.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
rev 012921
1. Click W
orkflow and select Alerts.
2. Click +
Add i n the upper right corner.
3. In the Name b
ox, type There are New VPR 9 or higher vulnerabilities
4. Click E
very day to the right of Schedule.
5. From the T
ime drop-down list select 08:30.
6. Under the C
ondition section, click +
Add Filter to the right of Filters.
7. Click S
elect a Filter a
nd select Vulnerability Priority Rating.
8. Click A
ll and select Custom Range.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
1
11. Click +
Add Filter.
15. Click E
mail.
16. In the Subject box, replace Email Alert with New VPR 9 or Higher Items.
18. In the Message box, type There are newly discovered VPR 9 or higher items that have been discovered
with last night’s scans.
20. Click S
ubmit.
1. The email that this alert generates does not send out a list of hosts. What options are there available
to send out a list of hosts?
1. Click S
cans and select Active Scans.
2. Locate C
ompanyname-hq Credentialed Scan, click the gear icon to the right and select Copy.
4. Click the N
ame box. Delete what is there and replace it with Credentialed vulnerability scan template
for alerts
5. Click S
ubmit.
6. Click W
orkflow.
7. Click A
lerts.
8. Click +
Add.
10. Click E
very day at to the right of S
chedule.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
13. Click S
elect a Filter a
nd select Plugin ID.
16. Click +
Add Filter.
17. Click S
elect a Filter and select V
ulnerability Last Observed.
18. Click W
ithin the last day and select More than 7 days ago.
20. Click +
Add Actions.
21. Click L
aunch Scan.
22. Click S
elect a Scan and select C
redentialed vulnerability scan template for alerts.
23. Click S
ubmit.
24. Click +
Add Actions.
25. Click E
mail.
26. In the Subject box, replace Email Alert with Hosts that have not been scanned in the last 7 days
29. Click S
ubmit.
30. Click S
ubmit once more.
Challenge Questions:
3. What is the target range of the scan that is used in this alert? What hosts are actually scanned when
this scan is triggered via an alert?
Part 2 - Create Alerts that Generate Reports
Create an on demand report that lists compliance failures that are more than 60 days old that are
automatically sent to the Compliance team via email. Then, set an alert that runs the report if there are any
compliance failures more than 60 days old.
Part 2: Task 1 - Create a Report
Create a report that lists compliance failures that are more than 60 days old.
Step-by-step Instructions:
1. Click R
eporting a
nd select Reports.
2. Click +
Add.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
3. Click P
DF.
5. Click D
efinition.
6. Click A
dd Chapter.
8. Click S
ubmit.
9. Mouse over C
ompliance Failures more than 60 days old and click Add Element.
10. Click T
able.
12. Click V
ulnerability Summary and select Vulnerability List.
13. Click +
Add Filter.
14. Click S
elect a Filter a
nd select Plugin Type.
17. Click +
Add Filter.
18. Click S
elect a Filter and select V
ulnerability Discovered.
19. Click W
ithin the Last Day a
nd select Custom Range.
21. Delete the 1 0 to the right of and. The entry will change to a
ll.
a. Family
b. VPR
c. MAC Address
d. Repository
24. Click S
ubmit.
25. Click S
ubmit once more.
Challenge Questions:
1. Why did we uncheck the VPR and Family items from the report?
2. Why did we use Vulnerability Discovered instead of Vulnerability Last Observed in the filter?
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
Part 1: Task 2 - Create an Alert to Launch a Report
Create a daily alert that looks for compliance failures more than 60 days old. If there are any, have it launch
the report generated in Task 1.
Step-by-step Instructions:
1. Click W
orkflow and select A
lerts.
2. Click +
Add.
3. In the Name b
ox, type Compliance failures more than 60 days old
4. Click E
very day at to the right of S
chedule.
5. In the Time b
ox, select 08:00.
6. Under the C
ondition section, click +
Add Filter.
7. Click S
elect a Filter a
nd select Plugin Type.
10. Click +
Add Filter.
11. Click S
elect a Filter and select V
ulnerability Discovered.
12. Click W
ithin the Last Day a
nd select Custom Range.
14. Delete the 1 0 to the right of and. The entry will change to a
ll.
16. Click +
Add Actions.
17. Click L
aunch Report.
18. Click S
elect a Report Template.
19. Select C
ompliance Failures more than 60 days old.
20. Click S
ubmit.
1. Will the compliance team receive a report via email when there is a compliance failure more than 60
days old?
2. What would you change to have them receive the report via email?
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
Part 3 - Create an Alert to Send a CSV File
Create an alert that sends out a CSV file of hosts where the most recent credentialed scan failed.
Part 3: Task 1 - Create a Query
Create and save a query named New Credential Failures that identifies credentialed scan failures in the last
24 hours. (Plugin ID 104410 will identify when credentials have failed during a scan.)
Step-by-step Instructions:
1. Click A
nalysis a
nd select Vulnerabilities.
3. Click C
lear Filters, if it is shown.
4. Click S
elect Filters.
5. Search for P
lugin ID.
7. Click A
pply.
8. Underneath P
lugin ID, click A
ll. Type 104410 i n the box to the right of =.
9. Click O
K.
10. Click S
elect Filters.
11. Type o
bserved
12. Select the check box to the left of Vulnerability Last Observed.
13. Click A
pply.
14. Click A
ll underneath Vulnerability Last Observed.
16. Click O
K.
17. Click A
pply All.
18. Click O
ptions (at the top right) and select S
ave Query.
21. Click S
ubmit.
Challenge Questions:
2. If we were performing weekly scans instead of daily, would this query work to identify scans with
credential failures? If not, how would you fix it?
3. Are there other queries that could be created to identify scans where credentials have failed?
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
Part 3: Task 2 - Create an Alert to Email a CSV File
Create an alert named Credentialed Scan Failures t hat sends an email to
[email protected] with a .csv file of hosts where credentials failed.
Step-by-step Instructions:
1. Click W
orkflow and select Alerts.
2. Click +
Add.
4. Click E
very day at to the right of S
chedule.
5. From the T
ime drop-down list, select 08:30.
6. Under C
ondition, click Select a Query and select Credential Failures in the Last 24 Hours.
7. Click +
Add Actions.
8. Click E
mail.
13. Click S
ubmit.
14. Click S
ubmit.
Challenge Questions:
1. If you were to modify the filters on this alert, would it modify the saved query?
2. What would you do if you wanted to generate a PDF report containing this information and deliver it to
the same email address?
End of Exercises
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
Answer Key
Part 1: Task 1
1. The email that this alert generates does not send out a list of hosts, what options are there available
to send out a list of hosts?
● If the Include Results option is enabled in the alert, a CSV file is sent inside the mail. You could
also create a PDF or RTF report template with the information with distribution to emails
defined, then adjust the alert to run the report if triggered.
2. What advantages are there to the various options?
● The CSV file requires less front end work. However, the enable option does not create an
actual attachment, so the user has to cut and paste the data. The launch report option
provides greater reporting options, as well as actually creating an attachment.
Part 1: Task 2
1. Why did we use the filter for Plugin ID 19506?
● Plugin ID 19506’s name is Nessus Scan Information and it will appear for every host using any
templated scan policy. Plugin ID 19506 is a good plugin to use for filtering to pull information
about the scan, as well as using the date filters to identify when the host was first, and most
recently scanned.
2. Why did we use Vulnerability Last Observed, instead of Vulnerability Discovered?
● In this case, we want to identify when the host was most recently scanned. The Vulnerability
Last Observed filter for plugin ID 19506 will identify when the host was most recently scanned.
3. What is the target range of the scan that is used in this alert? What hosts are actually scanned when
this scan is triggered via an alert?
● The actual scan definition uses the companyname-hq asset list. When launching a scan from a
triggered alert, the target range for the scan is defined as the host(s) that triggered the alert,
not what is defined in the scan itself.
Part 2: Task 1
1. Why did we uncheck the VPR and Family items from the report?
● VPR is not relevant to compliance checks, and plugin family is not going to provide any useful
information other than it is a compliance check.
2. Why did we use Vulnerability Discovered instead of Vulnerability Last Observed in the filter?
● Vulnerability Last Observed will return the most recent time the vulnerability was identified in
the host. In this case we want to identify how long the vulnerability has been on the host, so
we use the vulnerability discovered box.
Part 2: Task 2
1. Will the compliance team receive a report via email when there is a compliance failure more than 60
days old?
● No, the report will be generated, and available for download, but it will not be delivered via
email.
2. What would you change to have them receive the report via email?
● Change the Distribution options in the report so it delivers the report to the Compliance team
when run. Adding an email option in the alert will only tell the Compliance team that the alert
has triggered. If the Include Results option is turned on, it will send them a CSV, not the report
that was run.
Part 3: Task 1
1. How often is this query run in Tenable.sc?
● This query is only run when some other object calls it or a user loads the query. Saved Queries
in Tenable.sc do not automatically evaluate.
2. If we were performing weekly scans instead of daily, would this query work to identify scans with
credential failures? If not, how would you fix it?
● Yes. Because the check frequency (daily) and the date period on the query (last 24 hours) are
more frequent than the scan frequency, if credentials fail as a result of a scan, they will be
identified with the alert. However, this is not an efficient use of Tenable.sc resources, because
we know six of the seven times this alert is evaluated it will, without question, not trigger,
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
because scans have not run in the last 24 hours. It would be better to change the frequency of
the alert check to weekly, based upon the day of the week scans are being run.
3. Are there other queries that could be created to identify scans where credentials have failed?
● There are a large number of plugins that provide information on whether or not credentialed
scans run properly, including the plugin output of 19506 (credentialed scans: yes/no) and
Plugin ID 21745. Many times you will have different queries that use different approaches to
achieve effectively the same result.
Part 3: Task 2
1. If you were to modify the filters on this alert, would it modify the saved query?
● No. The query would remain unchanged. When selecting a query for any object, it retrieves the
filter settings for that query and populates the appropriate boxes in the object. The saved
query itself remains unchanged.
2. What would you do if you wanted to generate a PDF report containing this information and deliver it to
the same email address?
● Create a PDF report that contains the information desired, set the distribution to the desired
email address, and then add Launch Report to the alert.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
rev 010721
2. Click the M
enu button (three lines in the upper left corner) from the main dashboard.
3. Click the E
dit (pencil) icon.
5. Verify both your F irst Name and Last Name appear correctly.
6. Fill out any other required fields marked by a red asterisk (*) .
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
1
Part 1: Task 3 - Obtain Certificate of Attendance
Once the feedback survey has been completed, the course will also be marked as complete.
Step-by-step Instructions:
1. Locate the button at the top right that reads Download Your Certificate on the main course page.
This will be a PDF with your name, course name and date.
2. Download the PDF for your records.
End of Exercises
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
2
Tenable University
About
About Tenable
Tenable®, Inc. is the Cyber Exposure company. Over 30,000 organizations around the globe rely
on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended
its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital
asset on any computing platform. Tenable customers include more than 50 percent of the
Fortune 500, more than 30 percent of the Global 2000 and large government agencies. Learn
more at www.tenable.com.
COPYRIGHT 2021 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK
SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG
CORRELATION ENGINE ARE REGISTERED TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT,
LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE,
INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR RESPECTIVE OWNERS.
Rev 021621